WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts (TLP:CLEAR) CISA and Partner Agencies Release Guidance on Edge Devices
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) CISA and Partner Agencies Release Guidance on Edge Devices

TLP:CLEAR

Author: Chase Snow

Created: Thursday, February 6, 2025 - 13:05

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

Summary: CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems.

Analyst Comment: Threat actors frequently take advantage of software vulnerabilities in network edge devices to penetrate critical infrastructure networks and systems. The resulting damage can be costly, time-consuming, and carry severe reputational risks. WaterISAC recommends reviewing these guidance documents which outline several strategies to better enhance network security and resilience before and after an incident. Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities.

In addition to the guidance documents released by CISA and partners, WaterISAC also recommends members review Fundamental 5: Account for Critical Assets from WaterISACs 12 Cybersecurity Fundamentals for Water and Wastewater Utilities.

Some of the more widely used products/platforms with recent high-profile vulnerabilities which many utilities likely use:

  • Check Point VPN
  • Palo Alto Networks PAN-OS
  • Ivanti Connect Secure and Policy Secure (formerly Pulse Connect Secure)
  • Cisco ASA
  • Fortinet FortiOS SSL VPN

Original Source: https://www.cisa.gov/resources-tools/resources/guidance-and-strategies-protect-network-edge-devices

Additional Reading:

  • Threat Trend Awareness – Living on the Edge (of the Network Perimeter)

Mitigation Recommendations:

  • Fundamental 5 | Account for Critical Assets, WaterISAC’s 12 Fundamentals for Water and Wastewater Utilities

Related WaterISAC PIRs: 6, 8

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar