www.cisa.gov
Open in
urlscan Pro
2a02:26f0:dc:392::447a
Public Scan
Submitted URL: http://www.cisa.gov/ics
Effective URL: https://www.cisa.gov/ics
Submission: On January 17 via api from TR — Scanned from DE
Effective URL: https://www.cisa.gov/ics
Submission: On January 17 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to main content An official website of the United States government Here's how you know * REPORT * SUBSCRIBE * CONTACT * SITE MAP Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. × search -------------------------------------------------------------------------------- Toggle navigation × search CISA NAVIGATION * * * * * * -------------------------------------------------------------------------------- CISA’S ROLE IN INDUSTRIAL CONTROL SYSTEMS -------------------------------------------------------------------------------- Critical infrastructure (CI) across all sectors depend on control systems for safe and efficient operation. Advancing the security and resilience of industrial control systems (ICS) is one of CISA’s top priorities. As the lead federal agency responsible for helping CI partners manage ICS security risk, we partner with government and industry to deploy the technologies and practices that will guard critical infrastructure from the threats of today, while building innovative capabilities to defend against emerging threats on the horizon. CISA’S INDUSTRIAL CONTROL SYSTEMS PRIORITIES AND GOALS The security of industrial control systems is among the most important aspects of our collective effort to defend cyberspace. As ever, CISA remains committed to working with the industrial control systems (ICS) community to address both urgent operational cyber events and long-term ICS risk. While the ICS risk landscape evolves, this truth remains: the only way the nation can permanently shift the cybersecurity advantage to ICS cyber defenders is through collective action. Building on CISA’s “Securing Industrial Control systems: A Unified Initiative,” published in 2020, CISA’s efforts to reduce cyber risk to control systems center around four core priorities. * We must defend ICS environments against the most urgent threats. * Find and defeat adversaries before they cause harm. CISA and its partners will work together to improve visibility in OT environments so that we identify and defeat malicious activity quickly before it causes wide-spread harm. * We must equip critical infrastructure owners and operators and cyber defenders with the technologies and tools required to dramatically raise adversary time, costs, and technical barriers. * Finally, we must sustain operational resilience by addressing systemic weaknesses to better enable control systems to withstand cyber incidents with minimal impact to critical infrastructure. With those priorities in mind, here are 3 goals we’re working on: * Goal #1: CISA is working to develop and publish cross-sector and sector-specific cybersecurity performance goals – or CPG – across critical infrastructure sectors * CISA is leading an effort with the NIST to develop Cybersecurity Performance Goals, that apply to IT and OT owners across all critical infrastructure sectors. * The CPGs will contain actionable, measurable, attestable, and easily-implementable controls for IT and OT owners that significantly reduce risk to their enterprises and national security more broadly. * Once finalized, the Cross-Sector Cybersecurity Performance Goals will supersede the preliminary control systems performance goals established in fall of 2021. * Goal #2: CISA is significantly investing in our ICS workforce, especially technical experts. That means we’re hiring! Come work with us! * Goal #3: CISA will continue to collaborate cross-agency and with industry to track, detect, analyze, and respond to novel threats. QUICK LINKS Save time browsing. Here are the most commonly accessed CISA resources by the ICS community. Report a Vulnerability Report an ICS vulnerability on CISA’s vulnerability disclosure platform, VINCE. Partnerships and Engagement CISA’s Industrial Control Systems Joint Working Group (ICSJWG) facilitates information sharing and collaboration to reduce the risk to the nation’s industrial control systems. Training CISA offers free in-person and virtual ICS training courses and workshops to the community. ICS Advisories Visit CISA’s ICS Advisories pages for timely notifications and information about current security issues, vulnerabilities, exploits, and threats. CISA’S ICS OFFERINGS CISA offers a wide range of free products and services to support the ICS community's cybersecurity security risk management efforts. Visit this full catalog of all CISA ICS Service Offerings with additional details for each service listed. ASSESSMENT SERVICES * Cybersecurity Assessments: Vulnerability Scanning, Remote Penetration Testing, and more * Exercises: Testing and readiness for ICS incidents * Strategic Risk Analysis: Provide ICS risk information pertaining to National Critical Functions (NCFs) THREAT HUNTING AND INCIDENT RESPONSE * Threat Hunting(link sends email): Helping partners search for adversary activity in the absence of confirmed threats, and conducting activities pertaining to new vulnerabilities, and behavioral characteristics of emergent malware * Incident Response(link sends email): Providing incident response support and forensic analysis to victims of ICS-related attacks PARTNERSHIPS AND ENGAGEMENT * Industrial Control Systems Joint Working Group (ICSJWG) * CISA Regional Cybersecurity Support * Follow CISA ICS on Twitter(link is external) TECHNICAL PRODUCTS AND SERVICES * Stuff Off Search (SOS): Use these guides to help identify your ICS (or other) assets on the public internet * Cybersecurity Evaluation Tool (CSET)(link is external): A tool for performing guided cybersecurity assessments of an organization's ICS * Control Environment Laboratory Resource (CELR): A simulated environment for cybersecurity research on operational technology * Contact CELR(link sends email) * Malcolm(link is external): An open-source network traffic analysis tool * ICS Network Parsers(link is external): Open-source ICS protocol parsers for Zeek * Technical (Media) Analysis: Analysis of malware, digital media, and ICS hardware * Training: Technical and non-technical ICS instruction for all skill levels INFORMATION EXCHANGE * ICS Advisories * ICS Cybersecurity Threat Intelligence Sharing * ICS Cybersecurity Best Practices VULNERABILITY COORDINATION AND DISCLOSURE * CISA’s Coordinated Vulnerability Disclosure Process * VINCE: CISA’s platform for reporting, validating, and disclosing (ICS) vulnerabilities * Known Exploited Vulnerabilities: A list of vulnerabilities exploited by threat actors that should be remediated ADDITIONAL RESOURCES * Industrial Control Systems Cybersecurity Initiative: Considerations for ICS/OT Monitoring Technologies with an Emphasis on Detection and Information Sharing (pdf, 179KB) * CISA Expands the JCDC to Include Industrial Control Systems Industry Expertise * Securing Industrial Control Systems Strategy * Securing Industrial Control Systems Strategy Fact Sheet * Cybersecurity Best Practices for ICS * Rising Ransomware Threat to Operational Technology Assets Fact Sheet CAN’T FIND WHAT YOU’RE LOOKING FOR? GET IN TOUCH. WE'RE HIRING ICS TECHNICAL EXPERTS! FOR MORE INFO OR OTHER JOBS, VISIT CISA’S CAREERS PAGE. Was this webpage helpful? Yes | Somewhat | No Cybersecurity & Infrastructure Security Agency CONTACT SUBSCRIBE REPORT Need CISA’s help but don’t know where to start? Contact the CISA Service desk(link sends email). Accountability Privacy Policy FOIA No Fear Act Accessibility Plain Writing Plug-ins Inspector General DHS The White House USA.gov