<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
p.xxxmsonormal, li.xxxmsonormal, div.xxxmsonormal
{mso-style-name:x_x_x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xxxmsonospacing, li.xxxmsonospacing, div.xxxmsonospacing
{mso-style-name:x_x_x_msonospacing;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xxxcontentpasted1
{mso-style-name:x_x_x_contentpasted1;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="xxxmsonospacing"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonospacing"><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Today, the Cybersecurity and Infrastructure Security Agency (CISA) issued a Directive,
</span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"><a href="https://cisa.gov/news-events/directives/binding-operational-directive-23-02">Binding Operational Directive 23-02</a><span class="xxxcontentpasted1">,
that <i>requires federal civilian agencies</i> to remove specific networked management interfaces from the public-facing internet or implement Zero Trust Architecture capabilities that enforce access control to the interface within 14 days of discovery. </span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonospacing"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span class="xxxcontentpasted1"><i><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">While this Directive only applies to federal civilian executive branch agencies</span></i></span><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">,
the threat extends to every sector and we urge all organizations to adopt this guidance. </span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Threat actors have too frequently used certain classes of network devices to gain unrestricted access to organizational
networks leading to full scale compromises. Inadequate security, misconfigurations, and out of date software make these devices more vulnerable to exploitation. The risk is further compounded if device management interfaces are connected directly to, and accessible
from, the public-facing internet. </span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">Implementing appropriate controls and mitigations outlined in this directive is a necessary step to reducing unnecessary
risk to your network enterprise. Organizations should consider using all available capabilities to automatically identify networked management interfaces exposed to the public facing internet. Examples of such capabilities include CISA's
</span></span><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/cyber-hygiene-services">Cyber Hygiene Services</a><span style="color:black">.</span></span></span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonospacing"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></p>
<p class="xxxmsonormal"><span class="xxxcontentpasted1"><span style="font-size:12.0pt;font-family:"Franklin Gothic Book",sans-serif;color:black">As always, thank you for your continued collaboration. </span><o:p></o:p></span></p>
<p class="xxxmsonormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_2" src="cid:image003.png@01D99DD4.5F0A04E0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="xxxmsonormal"><o:p> </o:p></p>
</div>
</body>
</html>