www.cisa.gov Open in urlscan Pro
2a02:26f0:480:58c::447a  Public Scan

Submitted URL: http://www.cisa.gov/ics
Effective URL: https://www.cisa.gov/topics/industrial-control-systems
Submission: On May 30 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   Locally
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Contact Us
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home
 2. Topics

Share:




INDUSTRIAL CONTROL SYSTEMS

CISA is committed to working with the industrial control systems (ICS) community
to address urgent operational cyber events as well as long-term ICS risk.



INDUSTRIAL CONTROL SYSTEMS

 * Downloading and Installing CSET
 * ICS Training Available Through CISA
 * Industrial Control Systems Joint Working Group (ICSJWG)

Critical infrastructure (CI) across all sectors depend on control systems for
safe and efficient operation. Advancing the security and resilience of
industrial control systems (ICS) is one of CISA’s top priorities. As the lead
federal agency responsible for helping CI partners manage ICS security risk, we
partner with government and industry to deploy the technologies and practices
that will guard critical infrastructure from the threats of today, while
building innovative capabilities to defend against emerging threats on the
horizon.


CISA’S INDUSTRIAL CONTROL SYSTEMS PRIORITIES AND GOALS 

The security of industrial control systems is among the most important aspects
of our collective effort to defend cyberspace. As ever, CISA remains committed
to working with the industrial control systems (ICS) community to address both
urgent operational cyber events and long-term ICS risk.

While the ICS risk landscape evolves, this truth remains: the only way the
nation can permanently shift the cybersecurity advantage to ICS cyber defenders
is through collective action.

Building on CISA’s “Securing Industrial Control systems: A Unified Initiative,”
published in 2020, CISA’s efforts to reduce cyber risk to control systems center
around four core priorities.

 * We must defend ICS environments against the most urgent threats.
 * Find and defeat adversaries before they cause harm. CISA and its partners
   will work together to improve visibility in OT environments so that we
   identify and defeat malicious activity quickly before it causes wide-spread
   harm.
 * We must equip critical infrastructure owners and operators and cyber
   defenders with the technologies and tools required to dramatically raise
   adversary time, costs, and technical barriers.
 * Finally, we must sustain operational resilience by addressing systemic
   weaknesses to better enable control systems to withstand cyber incidents with
   minimal impact to critical infrastructure.

With those priorities in mind, here are 3 goals we’re working on:

 * Goal #1:  CISA will encourage broad adoption and use of the
   final Cross-Sector Cybersecurity Performance Goals – or CPG – published in
   October 2022. The voluntary CPGs apply to IT and OT owners across all
   critical infrastructure sectors and will, when implemented, significantly
   reduce risk to their enterprises and national security more broadly.  
   * Over the course of 2023, CISA will be working directly with stakeholders to
     develop Sector-Specific Goals designed to address each sector's specific
     cybersecurity risk in a more tailored fashion. 

 * Goal #2: CISA is significantly investing in our ICS workforce, especially
   technical experts. That means we’re hiring! Come work with us!
 * Goal #3: CISA will continue to collaborate cross-agency and with industry to
   track, detect, analyze, and respond to novel threats.


REPORT A VULNERABILITY

Report an ICS vulnerability using CISA’s vulnerability disclosure platform,
VINCE.

report


ICS ADVISORIES

Stay up-to-date with CISA's ICS Advisories for timely notifications and
information about current security issues, vulnerabilites, exploits, and
threats.


ICS TRAINING

CISA offers free in-person and virtual ICS training courses and workshops to the
community.


ICSJWG

CISA’s Industrial Control Systems Joint Working Group (ICSJWG) facilitates
information sharing and collaboration to reduce the risk to the nation’s
industrial control systems.


CISA’S ICS OFFERINGS  

CISA offers a wide range of free products and services to support the ICS
community's cybersecurity security risk management efforts. Visit this full
catalog of all CISA ICS Service Offerings with additional details for each
service listed. 

ASSESSMENT SERVICES 

 * Cybersecurity Assessments: Vulnerability Scanning, Remote Penetration
   Testing, and more 
 * Exercises: Testing and readiness for ICS incidents 
 * Strategic Risk Analysis: Provide ICS risk information pertaining to National
   Critical Functions (NCFs) 

THREAT HUNTING AND INCIDENT RESPONSE 

 * Threat Hunting(link sends email): Helping partners search for adversary
   activity in the absence of confirmed threats, and conducting activities
   pertaining to new vulnerabilities, and behavioral characteristics of emergent
   malware 
 * Incident Response(link sends email): Providing incident response support and
   forensic analysis to victims of ICS-related attacks 

PARTNERSHIPS AND ENGAGEMENT

 * Industrial Control Systems Joint Working Group (ICSJWG) 
 * CISA Regional Cybersecurity Support  
 * Follow CISA ICS on Twitter(link is external)  

TECHNICAL PRODUCTS AND SERVICES 

 * Stuff Off Search (SOS): Use these guides to help identify your ICS (or other)
   assets on the public internet
 * Cybersecurity Evaluation Tool (CSET)(link is external): A tool for performing
   guided cybersecurity assessments of an organization's ICS 
 * Control Environment Laboratory Resource (CELR): A simulated environment for
   cybersecurity research on operational technology 
 * Contact CELR(link sends email)
 * Malcolm(link is external): An open-source network traffic analysis tool 
 * ICS Network Parsers(link is external): Open-source ICS protocol parsers for
   Zeek(link is external) 
 * Technical (Media) Analysis: Analysis of malware, digital media, and ICS
   hardware 
 * Training: Technical and non-technical ICS instruction for all skill levels 

INFORMATION EXCHANGE 

 * ICS Advisories 
 * ICS Cybersecurity Threat Intelligence Sharing
 * ICS Cybersecurity Best Practices 

VULNERABILITY COORDINATION AND DISCLOSURE 

 * CISA’s Coordinated Vulnerability Disclosure Process 
 * VINCE(link is external): CISA’s platform for reporting, validating, and
   disclosing (ICS) vulnerabilities 
 * Known Exploited Vulnerabilities: A list of vulnerabilities exploited by
   threat actors that should be remediated 


WE'RE HIRING ICS TECHNICAL EXPERTS!

For more info or other jobs, visit CISA’s Careers page.

search careers


ADDITIONAL RESOURCES


CISA EXPANDS THE JOINT CYBER DEFENSE COLLABORATIVE TO INCLUDE INDUSTRIAL CONTROL
SYSTEMS INDUSTRY EXPERTISE

APR 20, 2022 | PRESS RELEASE
The JCDC has expanded to include Industrial Control Systems (ICS) experts to
further increase U.S. government focus on the cybersecurity and resilience of
industrial control systems and operational technology.



SECURING INDUSTRIAL CONTROL SYSTEMS

DEC 17, 2020 | PUBLICATION
Download File (PDF, 1.82 MB)


SECURING INDUSTRIAL CONTROL SYSTEMS FACT SHEET

DEC 17, 2020 | PUBLICATION
Download File (PDF, 473.6 KB)


CYBERSECURITY BEST PRACTICES FOR INDUSTRIAL CONTROL SYSTEMS

DEC 17, 2020 | PUBLICATION
Download File (PDF, 1.23 MB)


RANSOMWARE THREAT TO OT

JUN 09, 2021 | PUBLICATION
Download File (PDF, 349.39 KB)


GET IN TOUCH!

Can’t find what you’re looking for?

Email central@cisa.dhs.gov(link sends email) for more information.

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback