www.cisa.gov Open in urlscan Pro
2a02:26f0:dc:392::447a  Public Scan

Submitted URL: http://www.cisa.gov/ics
Effective URL: https://www.cisa.gov/ics
Submission: On January 17 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here's how you know
 * REPORT
 * SUBSCRIBE
 * CONTACT
 * SITE MAP

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.
×

search
 



--------------------------------------------------------------------------------


Toggle navigation
×

search
 


CISA NAVIGATION

 * 
 * 
 * 
 * 
 * 
 * 

--------------------------------------------------------------------------------




CISA’S ROLE IN INDUSTRIAL CONTROL SYSTEMS

--------------------------------------------------------------------------------

Critical infrastructure (CI) across all sectors depend on control systems for
safe and efficient operation. Advancing the security and resilience of
industrial control systems (ICS) is one of CISA’s top priorities. As the lead
federal agency responsible for helping CI partners manage ICS security risk, we
partner with government and industry to deploy the technologies and practices
that will guard critical infrastructure from the threats of today, while
building innovative capabilities to defend against emerging threats on the
horizon.


CISA’S INDUSTRIAL CONTROL SYSTEMS PRIORITIES AND GOALS 

The security of industrial control systems is among the most important aspects
of our collective effort to defend cyberspace. As ever, CISA remains committed
to working with the industrial control systems (ICS) community to address both
urgent operational cyber events and long-term ICS risk.

While the ICS risk landscape evolves, this truth remains: the only way the
nation can permanently shift the cybersecurity advantage to ICS cyber defenders
is through collective action.

Building on CISA’s “Securing Industrial Control systems: A Unified Initiative,”
published in 2020, CISA’s efforts to reduce cyber risk to control systems center
around four core priorities.

 * We must defend ICS environments against the most urgent threats.
 * Find and defeat adversaries before they cause harm. CISA and its partners
   will work together to improve visibility in OT environments so that we
   identify and defeat malicious activity quickly before it causes wide-spread
   harm.
 * We must equip critical infrastructure owners and operators and cyber
   defenders with the technologies and tools required to dramatically raise
   adversary time, costs, and technical barriers.
 * Finally, we must sustain operational resilience by addressing systemic
   weaknesses to better enable control systems to withstand cyber incidents with
   minimal impact to critical infrastructure.

With those priorities in mind, here are 3 goals we’re working on:

 * Goal #1:  CISA is working to develop and publish cross-sector and
   sector-specific cybersecurity performance goals – or CPG – across critical
   infrastructure sectors
   * CISA is leading an effort with the NIST to develop Cybersecurity
     Performance Goals, that apply to IT and OT owners across all critical
     infrastructure sectors. 
   * The CPGs will contain actionable, measurable, attestable, and
     easily-implementable controls for IT and OT owners that significantly
     reduce risk to their enterprises and national security more broadly.
   * Once finalized, the Cross-Sector Cybersecurity Performance Goals will
     supersede the preliminary control systems performance goals established in
     fall of 2021.
 * Goal #2: CISA is significantly investing in our ICS workforce, especially
   technical experts. That means we’re hiring! Come work with us!
 * Goal #3: CISA will continue to collaborate cross-agency and with industry to
   track, detect, analyze, and respond to novel threats.


QUICK LINKS 

Save time browsing.  Here are the most commonly accessed CISA resources by the
ICS community.

Report a Vulnerability

Report an ICS vulnerability on CISA’s vulnerability disclosure platform, VINCE.

 

Partnerships and Engagement

CISA’s Industrial Control Systems Joint Working Group (ICSJWG) facilitates
information sharing and collaboration to reduce the risk to the nation’s
industrial control systems.

Training

CISA offers free in-person and virtual ICS training courses and workshops to the
community.

 

ICS Advisories

Visit CISA’s ICS Advisories pages for timely notifications and information about
current security issues, vulnerabilities, exploits, and threats.

 

 


CISA’S ICS OFFERINGS  

CISA offers a wide range of free products and services to support the ICS
community's cybersecurity security risk management efforts. Visit this full
catalog of all CISA ICS Service Offerings with additional details for each
service listed. 

ASSESSMENT SERVICES 

 * Cybersecurity Assessments: Vulnerability Scanning, Remote Penetration
   Testing, and more 
 * Exercises: Testing and readiness for ICS incidents 
 * Strategic Risk Analysis: Provide ICS risk information pertaining to National
   Critical Functions (NCFs) 

THREAT HUNTING AND INCIDENT RESPONSE 

 * Threat Hunting(link sends email): Helping partners search for adversary
   activity in the absence of confirmed threats, and conducting activities
   pertaining to new vulnerabilities, and behavioral characteristics of emergent
   malware 
 * Incident Response(link sends email): Providing incident response support and
   forensic analysis to victims of ICS-related attacks 

PARTNERSHIPS AND ENGAGEMENT

 * Industrial Control Systems Joint Working Group (ICSJWG) 
 * CISA Regional Cybersecurity Support  
 * Follow CISA ICS on Twitter(link is external)  

TECHNICAL PRODUCTS AND SERVICES 

 * Stuff Off Search (SOS): Use these guides to help identify your ICS (or other)
   assets on the public internet
 * Cybersecurity Evaluation Tool (CSET)(link is external): A tool for performing
   guided cybersecurity assessments of an organization's ICS 
 * Control Environment Laboratory Resource (CELR): A simulated environment for
   cybersecurity research on operational technology 
 * Contact CELR(link sends email)
 * Malcolm(link is external): An open-source network traffic analysis tool 
 * ICS Network Parsers(link is external): Open-source ICS protocol parsers for
   Zeek 
 * Technical (Media) Analysis: Analysis of malware, digital media, and ICS
   hardware 
 * Training: Technical and non-technical ICS instruction for all skill levels 

INFORMATION EXCHANGE 

 * ICS Advisories 
 * ICS Cybersecurity Threat Intelligence Sharing
 * ICS Cybersecurity Best Practices 

VULNERABILITY COORDINATION AND DISCLOSURE 

 * CISA’s Coordinated Vulnerability Disclosure Process 
 * VINCE: CISA’s platform for reporting, validating, and disclosing (ICS)
   vulnerabilities 
 * Known Exploited Vulnerabilities: A list of vulnerabilities exploited by
   threat actors that should be remediated 


ADDITIONAL RESOURCES

 * Industrial Control Systems Cybersecurity Initiative:  Considerations for
   ICS/OT Monitoring Technologies with an Emphasis on Detection and Information
   Sharing (pdf, 179KB)
 * CISA Expands the JCDC to Include Industrial Control Systems Industry
   Expertise
 * Securing Industrial Control Systems Strategy 
 * Securing Industrial Control Systems Strategy Fact Sheet 
 * Cybersecurity Best Practices for ICS 
 * Rising Ransomware Threat to Operational Technology Assets Fact Sheet 

CAN’T FIND WHAT YOU’RE LOOKING FOR? GET IN TOUCH.  

WE'RE HIRING ICS TECHNICAL EXPERTS! FOR MORE INFO OR OTHER JOBS, VISIT CISA’S
CAREERS PAGE. 

Was this webpage helpful?  Yes  |  Somewhat  |  No

Cybersecurity & Infrastructure Security Agency
CONTACT SUBSCRIBE
        
REPORT
 

Need CISA’s help but don’t know where to start? Contact the CISA Service
desk(link sends email).

 
Accountability   Privacy Policy   FOIA   No Fear Act   Accessibility   Plain
Writing   Plug-ins   Inspector General   DHS   The White House   USA.gov