CISA Orders Federal Agencies to Remove Unsupported Edge Devices to Curb Network Risk

Related

Zscaler Acquires Browser Security Firm SquareX to Embed Zero Trust Directly Into Web Browsers

What happened Cloud security provider Zscaler announced it has acquired...

CISA Orders Federal Agencies to Remove Unsupported Edge Devices to Curb Network Risk

  What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

Germany Warns of State-Linked Phishing Campaign Targeting Signal Users

What happened Germany’s Federal Office for the Protection of the...

Link11 Forecasts Top 5 Cybersecurity Trends Shaping European Defense Strategies in 2026

What happened European cybersecurity firm Link11 has released new analysis...

Share

 

What happened

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive 26‑02 requiring Federal Civilian Executive Branch (FCEB) agencies to identify, update, or remove “end‑of‑support” edge network devices, including firewalls, routers, switches, wireless access points, IoT edge devices and similar hardware, that no longer receive security updates from original equipment manufacturers. Agencies have strict timelines: inventory within three months, decommission devices past end‑of‑support within 12-18 months, and implement continuous lifecycle management within 24 months.

Who is affected

The directive is mandatory for U.S. civilian federal agencies and targets active network edge devices that have reached or will soon reach end‑of‑support. While the requirement applies federally, CISA has encouraged state, local, and private sector organizations to consider similar measures. 

Why CISOs should care

Unsupported edge devices are attractive targets for advanced threat actors, including nation‑state groups, because they no longer receive vendor updates or security patches. Positioned at the network perimeter, these devices can provide an initial access vector, enabling lateral movement, disruption, or data exfiltration. The federal directive signals a broader trend toward proactive asset lifecycle governance that private sector CISOs should anticipate and adopt to reduce risk and technical debt. 

3 practical actions

  1. Perform comprehensive inventory and classification of all edge network devices across your enterprise to identify devices that are at or near end‑of‑support.
  2. Develop and enforce a lifecycle management policy that includes timelines for patching, upgrade, replacement, and decommissioning of outdated network hardware and software.
  3. Prioritize segmentation and compensating controls for any remaining legacy devices while planning their phase‑out to reduce the risk of compromise during transition.