CISA pushes Federal agencies to retire end-of-support edge devices
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章标题是“CISA推动联邦机构淘汰已过支持期的边缘设备”。里面提到CISA要求美国联邦机构加强边缘网络设备的管理,并在12到18个月内替换不再受支持的设备。这些设备因为没有安全更新,容易被威胁分子攻击。CISA还给出了具体措施,比如清点设备、报告过期设备、更新或替换它们,并加强生命周期管理。 接下来,我需要把这些信息浓缩成一句话,不超过100字。要包括CISA、联邦机构、淘汰过期边缘设备、时间范围以及原因(如安全风险)。同时,语言要简洁明了,避免复杂的结构。 可能会先列出关键点:CISA要求联邦机构在12-18个月内淘汰过期边缘设备,因为这些设备存在安全风险。然后把这些点连贯地组织起来。 最后检查字数是否符合要求,并确保信息准确无误。 </think> CISA要求美国联邦机构在12至18个月内淘汰不再受制造商支持的边缘网络设备,以减少网络安全风险并提升基础设施安全性。 2026-2-7 10:55:10 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

CISA pushes Federal agencies to retire end-of-support edge devices

Pierluigi Paganini February 07, 2026

CISA ordered U.S. federal agencies to improve management of edge network devices and replace unsupported ones within 12–18 months.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) instructed U.S. federal civilian agencies to strengthen how they manage edge network devices throughout their lifecycle. According to Binding Operational Directive 26-02, Mitigating Risk From End-of-Support Edge Devices, agencies must identify and replace devices that no longer receive security updates from manufacturers within the next 12 to 18 months to reduce cyber risks and improve infrastructure security.

The directive requires Federal Civilian Executive Branch (FCEB) agencies to take specific actions to drive down technical debt and minimize the risk of compromise.” reads the advisory published by the U.S. Cybersecurity and Infrastructure Security Agency. “Within a specified timeframe, FCEB agencies must strengthen asset lifecycle management for active edge devices and remove any hardware and software devices that is no longer supported by its original equipment manufacturer. ”

The agency warns that threat actors increasingly target unsupported edge devices that sit at the network perimeter and no longer receive security updates. To reduce this risk, CISA requires federal agencies to inventory all edge devices, report those that are end-of-support, update or replace them with supported versions, remove unsupported hardware from networks, and adopt strong lifecycle management to continuously track device status.

“Unsupported devices pose a serious risk to federal systems and should never remain on enterprise networks,” said CISA Acting Director Madhu Gottumukkala. “When the threat landscape demands decisive action, CISA will direct FCEB agencies to strengthen cyber resilience and build a stronger, safer digital infrastructure for America’s future. CISA strongly encourages non-federal organizations to adopt similar actions to strengthen the security of their edge devices.”

CISA says strong cyber hygiene starts by removing unsupported edge devices. Managing asset lifecycles and retiring end-of-support technology reduces risk and improves resilience across government and beyond. As agencies carry out the directive, CISA will track compliance, review progress, and provide support as needed. The agency also clarified that edge devices include firewalls, routers, switches, load balancers, wireless access points, IoT edge devices, SDN components, and other network systems that route traffic and hold privileged access.

“Practicing good cyber hygiene starts with eliminating unsupported edge devices,” said CISA Executive Assistant Director for Cybersecurity Nick Andersen. “Driving timely risk reduction across the federal enterprise is critical, but true impact comes when all organizations commit to the same goal. By proactively managing asset lifecycles and removing end-of-support technology, we can collectively strengthen resilience and protect the global digital ecosystem.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, edge network devices)




文章来源: https://securityaffairs.com/187697/security/cisa-pushes-federal-agencies-to-retire-end-of-support-edge-devices.html
如有侵权请联系:admin#unsafe.sh