Blog - Edgeium

How to Harden Cisco Access-Layer Switches for Security Compliance — Without IOS Software Updates

Written by Eric Sommers | 01.15.2026

Are software updates required to maintain compliance with SOC2, ISO 27001, or PCI?

 The short answer: IOS software updates are not required to maintain compliance with SOC2, ISO 27001, or PCI DSS on Cisco access-layer switches. Compliance is achievable — and fully defensible in an audit — through deliberate LAN configuration hardening: enforcing least privilege, strong authentication, network segmentation, encrypted management access, centralized logging, and control-plane protection. This article provides a complete hardening framework mapped to specific SOC2 Trust Services Criteria (CC6, CC7, CC8) and ISO 27001 Annex A controls, along with Cisco IOS configuration templates for a 3850 on 16.9 that satisfy these requirements without requiring a software upgrade. 

We continue to see software updates breaking networks.  This has always been an issue, so why do we keep doing it?  FUD.

Software updates are not required to stay compliant with SOC2, ISO, and PCI.

Or maybe bad guidance is more accurate.  And to be fair, "where" the device is in the network being updated is everything. Core, security, and datacenter environments are one thing; access layers are another.

Access layers on average, account for 60-70% of our entire network estates.  This article is only about those last device connections like closet switches, access points, or anything else plugged into that last switch, providing network access to that last endpoint.

One of the most recent FUD reasons raised when discussing either used network hardware or alternatives to OEM maintenance, like our CovrEDGE, was the "need to have access to" iOS updates.  For the access layer, the "need for access to IOS updates" has always been based on a hypothetical "if this happened" scenario.  Hence, the FUD.  FUD Monster literally has said, "If you don't have access to IOS updates and something happens, you'll lose your job!!"

That's #FUD101 and has kept the "we only buy new" crew from logically analyzing their actual need for access to IOS updates.

In the last 5 years, 148 "High" security vulnerabilities have been issued for Catalyst IOS-XE builds.  To comply with the notion that someone out there is current, that would have required a NetOps team to have made 29.6 (unexpected or unplanned) image changes per year.  That's 2.5 image changes per month.  Now multiply this by the number of switches you have in your network.  And don't forget at least 2 weeks per new image to work through change management safeguards.  The need to have access to IOS updates in our Access layer, along with whether anyone is successful in maintaining a standard current image is fake news....

Frightened NetOpps engineer fires, "This is why we need automation to deploy software updates!!"  Also fake news.  Analyze the cost of access network cloud management platforms in relation to the benefit it provides.

Can you give me even one example of a failure that occurred when you did not deploy an update in your access layer?  That's assuming you hardened your LAN configurations, which is what this article is about!  The simple fact is that updating software has caused significantly more issues than not, and "access to IOS updates" is not required to maintain compliance.

Did you know IOS development for security vulnerabilities in the 3850s stopped in October 2025?  Does that mean they all need to be replaced ASAP?  Of course not!!

Hardening your L2 configuration without relying on software updates is about maximizing security using configuration, physical controls, and procedural mitigations.  If done properly and accompanied with a configuration attestation memo, we're compliant. 

A hardened LAN configuration is a set of deliberate security controls and settings applied to your switches to harden the device, reduce attack surface, and prevent common LAN-based attacks (e.g., spoofing, rogue devices, VLAN hopping, credential theft, etc).

We have completed templates available upon request for varying platforms and images, but I've included below a few examples for a 3850 on 16.9.  These configurations enforce least privilege, strong authentication, network segmentation, encrypted management, centralized logging, and control-plane protection, satisfying SOC 2 CC6/CC7/CC8 and ISO 27001 Annex A network, access control, and monitoring requirements without requiring software upgrades.

Compliance Summary Table

Framework Control

Requirement

Addressed by Configuration Section

SOC2 CC6.1

Logical access controls and secure configuration

System identification, baseline hardening, SSH-only management, MGMT ACL

SOC2 CC6.2

User authentication and authorization

AAA new-model, local auth, privilege levels

SOC2 CC6.3

Protection against brute-force attacks

Login block-for, login delay

SOC2 CC6.6

Network segmentation

VLAN structure (Users / Voice / WiFi / Guest / MGMT / Inactive Ports), interface VLAN 1 shutdown

SOC2 CC6.7

Secure administrative access

SSH v2, RSA 4096, transport input ssh, VTY ACL

SOC2 CC7.1

Preventive security measures

No IP source-route, no CDP/LLDP run, no HTTP/HTTPS server, BPDU guard, storm control

SOC2 CC7.2

Detection of anomalies and security events

Syslog host, logging trap, archive log config

SOC2 CC7.4

Logging consistency for investigation

Timestamps with msec, logging buffered

SOC2 CC8.1

Change management controls

Write memory, archive log config notify syslog

ISO 27001 A.9

Access control

AAA, port security, 802.1x (switchport port-security, ip verify source)

ISO 27001 A.12

Operations security

NTP authenticate, logging host, service timestamps

PCI DSS 1.3

Network segmentation

VLAN isolation, trunk protection, no native VLAN 1

PCI DSS 2.2

Hardened system configuration

No unused services (no service pad, no ip finger, no ip rcmd), strong passwords

 

Configuration

1.  System Identification, Configuration Integrity, and Baseline Hardening (SOC2: CC6.1 / CC7.1):

hostname SW-3850-Hardened-Config
service password-encryption
no service pad
no service dhcp
no service tcp-small-servers
no service udp-small-servers
no service config
no ip source-route
no ip finger
no ip rcmd rcp-enable
no ip rcmd rsh-enable
no ip domain-lookup
no ip gratuitous-arps
no ip http server
no ip http secure-server
no cdp run
no lldp run
no ip igmp snooping

2.  Time Synchronization & Logging Integrity (SOC2: CC7.2 / CC7.4):

service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
ntp authenticate
ntp server <IP ADDRESS> key 1
ntp authentication-key 1 md5 <KEY>
ntp trusted-key 1

3.  Authentication, Authorization, and Account Security (AAA) (SOC2: CC6.2 / CC6.3):

aaa new-model
aaa authentication login default local
aaa authorization exec default local
aaa authentication login CONSOLE local
aaa authentication login VTY local
aaa authorization exec VTY local
aaa session-id common
username admin privilege 15 secret <PASSWORD>
enable secret <PASSWORD>
login block-for 120 attempts 3 within 60
login delay 5

4.  Secure Management Access (SSH, ACLs) (SOC2: CC6.1 / CC6.7):

crypto key generate rsa modulus 4096
ip ssh version 2
ip ssh time-out 30
ip ssh authentication-retries 2
access-class MGMT-ACL in
transport input ssh
ip access-list standard MGMT-ACL
permit 10.10.10.0 0.0.0.255
deny any

5.  Centralized Logging & Audit Trails (SOC2: CC7.2 / CC7.4):

logging buffered 64000 warnings
logging host <IP ADDRESS>
logging trap warnings
logging console critical
logging monitor warnings
archive
log config
logging enable
notify syslog

6.  Network Segmentation & Management Isolation (SOC2: CC6.1 / CC6.7):

vlan 10 USERS
vlan 20 VOICE
vlan 30 WIFI
vlan 40 GUEST
vlan 99 MGMT
vlan 999 INACTIVE PORTS
interface vlan 1
shutdown

7.  Access Port Protections (Layer 2 Security) (SOC2: CC6.6 / CC7.1):

switchport port-security
switchport port-security maximum 2
switchport port-security violation restrict
switchport port-security mac-address sticky
ip verify source
ip dhcp snooping vlan <VLANs>
ip arp inspection vlan <VLANs>
spanning-tree bpduguard enable
storm-control broadcast level 1.00
storm-control multicast level 1.00

8.  Trunk & Control Plane Protection (SOC2: CC6.6 / CC7.1):

ip access-list extended CP-MGMT
class-map MGMT-TRAFFIC
policy-map CONTROL-PLANE-POLICY
control-plane
service-policy input CONTROL-PLANE-POLICY

9.  Configuration Retention (SOC2: CC8.1)

write memory

The above example is only partially complete.  For a completed hardened template, please provide your platform and current image to your Edgeium account manager, and we'll send back a completed hardened config along with supporting documentation for your auditor.

Don't believe access to software updates are required to stay compliant.  It's simply not true.

Secondary-market resellers are the only thing preventing Cisco from forcing the adoption of cloud management platforms and subscription-based licensing on you.

Don't let the FUD Monster scare you into wasting money.  Partner with a secondary market company like Edgeium and free up 50% of your network budget to be allocated towards other initiatives that provide value!!

Thank you for reading!

Frequently Asked Questions

Do Cisco access-layer switches need IOS software updates to be SOC2 compliant?

No. SOC2 compliance for access-layer switches is achievable through LAN configuration hardening without requiring IOS software updates. The SOC2 Trust Services Criteria (CC6, CC7, CC8) that apply to network infrastructure are addressed through configuration controls: logical access (AAA, SSH, ACLs), segmentation (VLANs, port security), logging (syslog, timestamps), and change management (archive, write memory). These controls are available in the IOS version already running on your switches.

Do Cisco access-layer switches need IOS updates to meet PCI DSS requirements?

No. PCI DSS network requirements — segmentation, access control, logging, and hardened configuration — are addressed through switch configuration, not IOS version currency. PCI DSS 1.3 requires network segmentation between cardholder data environments and other networks, which is implemented via VLAN isolation, trunk protection, and firewall policy. PCI DSS 2.2 requires hardened system configuration, which is achieved by disabling unused services and enforcing strong authentication — all configurable without a software upgrade.

What is LAN hardening and how does it help with compliance?

LAN hardening is the practice of applying deliberate security configurations to network switches to reduce attack surface and prevent common LAN-based attacks, including VLAN hopping, ARP spoofing, DHCP starvation, rogue device insertion, and management-plane compromise. A hardened LAN configuration includes: strict AAA with local authentication and brute-force protection, SSH v2 with RSA 4096 management-only access, VLAN segmentation with inactive port isolation, port security with MAC sticky and violation restrict, DHCP snooping and ARP inspection, BPDU guard, storm control, and centralized syslog with NTP-authenticated timestamps. When paired with a configuration attestation memo, this satisfies the evidence requirements of SOC2 and ISO 27001 audits without requiring IOS version certification.

How many IOS security vulnerabilities has Cisco issued in recent years?

In the five years prior to 2026, Cisco issued 148 'High' severity security vulnerabilities for Catalyst IOS-XE builds relevant to C9300 switches. Maintaining a 'current' IOS image across an access-layer fleet would have required approximately 29.6 unplanned image changes per year — about 2.5 per month. Given standard change management processes (minimum 2-week review cycles per image), this pace is operationally impossible for most NetOps teams. This is one reason why the premise of 'you must have access to IOS updates to be secure' does not hold up under scrutiny.

What is a configuration attestation memo and when do I need one?

A configuration attestation memo is a document that records the specific security controls applied to your network infrastructure and maps each control to the compliance framework requirements it satisfies. It is used as audit evidence to demonstrate that your network configuration meets the required security standards without relying on OEM software update currency as the sole evidence of security posture. Edgeium provides completed hardened configuration templates along with a supporting configuration attestation memo upon request — specify your platform and current IOS version to receive a template tailored to your environment.

Does Cisco stopping IOS security patches for a switch (like the 3850 in October 2025) mean it needs immediate replacement?

No. The end of IOS security patch development for a specific platform means Cisco will no longer issue new software patches for vulnerabilities discovered after that date. It does not mean existing vulnerabilities are newly exploitable or that currently deployed switches are suddenly insecure. For access-layer switches operating with hardened configurations, network segmentation, and appropriate access controls, the practical security risk of remaining on a stable hardened IOS version is far lower than the operational risk of an unplanned software update cycle.