WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships CISA Issues Binding Operational Directive (BOD) 22-01 to Address Known Exploited Vulnerabilities
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Issues Binding Operational Directive (BOD) 22-01 to Address Known Exploited Vulnerabilities

Author: Alec Davison

Created: Thursday, November 4, 2021 - 15:22

Categories: Cybersecurity

The Cybersecurity and Infrastructure Security Agency (CISA) announced a new Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities. The intent of the BOD is to address the remediation of vulnerabilities which are being actively exploited by adversaries. CISA has also created a public catalog of pertinent vulnerabilities. The catalog will be updated regularly and members are encouraged to register to receive notification when new vulnerabilities are added. This BOD is binding for Federal agencies, but all organizations – private businesses, industry, and state, local, tribal and territorial (SLTT) governments – are strongly encouraged to prioritize mitigation of these vulnerabilities. This call for addressing known vulnerabilities emphasizes previous WaterISAC recommendations to protect your utility from compromise – including ransomware – due to devices left unpatched or otherwise unprotected. Read the Binding Operational Directive and access the Catalog of Known Exploited Vulnerabilities at CISA.
 
Additional WaterISAC posts for reference:

  • Ransomware Resilience – Deferred Patching Could Result in a Ransomware Attack
  • Critical SSL VPN Vulnerabilities Across Multiple Products – Please Patch ‘em if you Got ‘em
  • Patching Vulnerabilities is Hard, Exploiting Unpatched Vulnerabilities…Not So Much

To assist public and private sector partners, CISA invites participants to a cross-sector stakeholder call:

Meeting Date: Friday, Nov 5, 2021   

Meeting Time: 2:00pm – 2:30pm EST   

Dial-in information: 1-415-228-4585   (Toll Free # 800-857-6546)   

Access code: 2170340   

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar