WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships CISA Shares Best Practices for Cisco Device Configuration
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Shares Best Practices for Cisco Device Configuration

Author: Chase Snow

Created: Thursday, August 8, 2024 - 19:20

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

In recent incidents, CISA has observed that malicious cyber actors have obtained system configuration files by exploiting available protocols or software on devices, including the misuse of the legacy Cisco Smart Install feature. CISA recommends organizations disable Smart Install and review NSA’s Smart Install Protocol Misuse advisory and Network Infrastructure Security Guide for configuration guidance. 

CISA continues to observe weak password types on Cisco network devices, enabling password cracking attacks that allow threat actors to easily access system configuration files and compromise victim networks. To mitigate this risk, CISA recommends using Type 8 password protection for all Cisco devices, as it is more secure than other types and approved by NIST. Organizations are urged to review the NSA’s Cisco Password Types: Best Practices guide for more information and to adhere to best practices for securing administrator accounts and passwords to ensure adequate protection.

  • Properly store passwords with a strong hashing algorithm. 
  • Do not reuse passwords across systems. 
  • Assign passwords that are strong and complex. 
  • Do not use group accounts that do not provide accountability.

Find the full alert and guidance at CISA.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar