www.cisa.gov
Open in
urlscan Pro
2a02:26f0:480:58c::447a
Public Scan
Submitted URL: http://www.cisa.gov/ics
Effective URL: https://www.cisa.gov/topics/industrial-control-systems
Submission: On May 30 via api from TR — Scanned from DE
Effective URL: https://www.cisa.gov/topics/industrial-control-systems
Submission: On May 30 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to main content An official website of the United States government Here’s how you know Here’s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Cybersecurity & Infrastructure Security Agency America's Cyber Defense Agency Search × search Menu Close × search * Topics Topics Cybersecurity Best Practices Cyber Threats and Advisories Critical Infrastructure Security and Resilience Election Security Emergency Communications Industrial Control Systems Information and Communications Technology Supply Chain Security Partnerships and Collaboration Physical Security Risk Management How can we help? GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help Locally * Spotlight * Resources & Tools Resources & Tools All Resources & Tools Services Programs Resources Training Groups * News & Events News & Events News Events Cybersecurity Alerts & Advisories Directives Request a CISA Speaker Congressional Testimony * Careers Careers Benefits & Perks HireVue Applicant Reasonable Accommodations Process Hiring Resume & Application Tips Students & Recent Graduates Veteran and Military Spouses Work @ CISA * About About Culture Divisions & Offices Regions Leadership Doing Business with CISA Contact Us Site Links Reporting Employee and Contractor Misconduct CISA GitHub Report a Cyber Issue America's Cyber Defense Agency Breadcrumb 1. Home 2. Topics Share: INDUSTRIAL CONTROL SYSTEMS CISA is committed to working with the industrial control systems (ICS) community to address urgent operational cyber events as well as long-term ICS risk. INDUSTRIAL CONTROL SYSTEMS * Downloading and Installing CSET * ICS Training Available Through CISA * Industrial Control Systems Joint Working Group (ICSJWG) Critical infrastructure (CI) across all sectors depend on control systems for safe and efficient operation. Advancing the security and resilience of industrial control systems (ICS) is one of CISA’s top priorities. As the lead federal agency responsible for helping CI partners manage ICS security risk, we partner with government and industry to deploy the technologies and practices that will guard critical infrastructure from the threats of today, while building innovative capabilities to defend against emerging threats on the horizon. CISA’S INDUSTRIAL CONTROL SYSTEMS PRIORITIES AND GOALS The security of industrial control systems is among the most important aspects of our collective effort to defend cyberspace. As ever, CISA remains committed to working with the industrial control systems (ICS) community to address both urgent operational cyber events and long-term ICS risk. While the ICS risk landscape evolves, this truth remains: the only way the nation can permanently shift the cybersecurity advantage to ICS cyber defenders is through collective action. Building on CISA’s “Securing Industrial Control systems: A Unified Initiative,” published in 2020, CISA’s efforts to reduce cyber risk to control systems center around four core priorities. * We must defend ICS environments against the most urgent threats. * Find and defeat adversaries before they cause harm. CISA and its partners will work together to improve visibility in OT environments so that we identify and defeat malicious activity quickly before it causes wide-spread harm. * We must equip critical infrastructure owners and operators and cyber defenders with the technologies and tools required to dramatically raise adversary time, costs, and technical barriers. * Finally, we must sustain operational resilience by addressing systemic weaknesses to better enable control systems to withstand cyber incidents with minimal impact to critical infrastructure. With those priorities in mind, here are 3 goals we’re working on: * Goal #1: CISA will encourage broad adoption and use of the final Cross-Sector Cybersecurity Performance Goals – or CPG – published in October 2022. The voluntary CPGs apply to IT and OT owners across all critical infrastructure sectors and will, when implemented, significantly reduce risk to their enterprises and national security more broadly. * Over the course of 2023, CISA will be working directly with stakeholders to develop Sector-Specific Goals designed to address each sector's specific cybersecurity risk in a more tailored fashion. * Goal #2: CISA is significantly investing in our ICS workforce, especially technical experts. That means we’re hiring! Come work with us! * Goal #3: CISA will continue to collaborate cross-agency and with industry to track, detect, analyze, and respond to novel threats. REPORT A VULNERABILITY Report an ICS vulnerability using CISA’s vulnerability disclosure platform, VINCE. report ICS ADVISORIES Stay up-to-date with CISA's ICS Advisories for timely notifications and information about current security issues, vulnerabilites, exploits, and threats. ICS TRAINING CISA offers free in-person and virtual ICS training courses and workshops to the community. ICSJWG CISA’s Industrial Control Systems Joint Working Group (ICSJWG) facilitates information sharing and collaboration to reduce the risk to the nation’s industrial control systems. CISA’S ICS OFFERINGS CISA offers a wide range of free products and services to support the ICS community's cybersecurity security risk management efforts. Visit this full catalog of all CISA ICS Service Offerings with additional details for each service listed. ASSESSMENT SERVICES * Cybersecurity Assessments: Vulnerability Scanning, Remote Penetration Testing, and more * Exercises: Testing and readiness for ICS incidents * Strategic Risk Analysis: Provide ICS risk information pertaining to National Critical Functions (NCFs) THREAT HUNTING AND INCIDENT RESPONSE * Threat Hunting(link sends email): Helping partners search for adversary activity in the absence of confirmed threats, and conducting activities pertaining to new vulnerabilities, and behavioral characteristics of emergent malware * Incident Response(link sends email): Providing incident response support and forensic analysis to victims of ICS-related attacks PARTNERSHIPS AND ENGAGEMENT * Industrial Control Systems Joint Working Group (ICSJWG) * CISA Regional Cybersecurity Support * Follow CISA ICS on Twitter(link is external) TECHNICAL PRODUCTS AND SERVICES * Stuff Off Search (SOS): Use these guides to help identify your ICS (or other) assets on the public internet * Cybersecurity Evaluation Tool (CSET)(link is external): A tool for performing guided cybersecurity assessments of an organization's ICS * Control Environment Laboratory Resource (CELR): A simulated environment for cybersecurity research on operational technology * Contact CELR(link sends email) * Malcolm(link is external): An open-source network traffic analysis tool * ICS Network Parsers(link is external): Open-source ICS protocol parsers for Zeek(link is external) * Technical (Media) Analysis: Analysis of malware, digital media, and ICS hardware * Training: Technical and non-technical ICS instruction for all skill levels INFORMATION EXCHANGE * ICS Advisories * ICS Cybersecurity Threat Intelligence Sharing * ICS Cybersecurity Best Practices VULNERABILITY COORDINATION AND DISCLOSURE * CISA’s Coordinated Vulnerability Disclosure Process * VINCE(link is external): CISA’s platform for reporting, validating, and disclosing (ICS) vulnerabilities * Known Exploited Vulnerabilities: A list of vulnerabilities exploited by threat actors that should be remediated WE'RE HIRING ICS TECHNICAL EXPERTS! For more info or other jobs, visit CISA’s Careers page. search careers ADDITIONAL RESOURCES CISA EXPANDS THE JOINT CYBER DEFENSE COLLABORATIVE TO INCLUDE INDUSTRIAL CONTROL SYSTEMS INDUSTRY EXPERTISE APR 20, 2022 | PRESS RELEASE The JCDC has expanded to include Industrial Control Systems (ICS) experts to further increase U.S. government focus on the cybersecurity and resilience of industrial control systems and operational technology. SECURING INDUSTRIAL CONTROL SYSTEMS DEC 17, 2020 | PUBLICATION Download File (PDF, 1.82 MB) SECURING INDUSTRIAL CONTROL SYSTEMS FACT SHEET DEC 17, 2020 | PUBLICATION Download File (PDF, 473.6 KB) CYBERSECURITY BEST PRACTICES FOR INDUSTRIAL CONTROL SYSTEMS DEC 17, 2020 | PUBLICATION Download File (PDF, 1.23 MB) RANSOMWARE THREAT TO OT JUN 09, 2021 | PUBLICATION Download File (PDF, 349.39 KB) GET IN TOUCH! Can’t find what you’re looking for? Email central@cisa.dhs.gov(link sends email) for more information. Return to top * Topics * Spotlight * Resources & Tools * News & Events * Careers * About Cybersecurity & Infrastructure Security Agency * Facebook * Twitter * LinkedIn * YouTube * Instagram * RSS CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email) DHS Seal CISA.gov An official website of the U.S. Department of Homeland Security * About CISA * Accessibility * Budget and Performance * DHS.gov * FOIA Requests * No FEAR Act * Office of Inspector General * Privacy Policy * Subscribe * The White House * USA.gov * Website Feedback