ICS Guidance
ICS Advisories. CISA publishes ICS advisories to help organizations address ICS vulnerabilities. These advisories cover ICS cybersecurity topics and focus on mitigations that ICS vendors have published for vulnerabilities in their products. These advisories aim to reduce risks associated with exploitation of vulnerabilities affecting ICS, which can lead to data corruption, exfiltration, or significant physical consequences. CISA also publishes Medical Device Advisories that focus on on mitigations that ICS medical vendors have published for vulnerabilities in their products.
Cybersecurity Advisories (CSAs). CISA publishes CSAs to provide detection methods for exploitation and indicators of compromise in response to cyber operational events and incidents. CISA often jointly produces CSAs with relevant private and public sector partners as well as international counterparts. These advisories provide collaborative research on cyber threats and encourage critical infrastructure asset owners and cyber defenders to apply the recommended mitigations.
Internet Exposure Reduction Guidance. CISA published this guidance to help organizations proactively identify and mitigate exposures, reducing their online footprint and strengthening cybersecurity.
Cybersecurity Performance Goals (CPGs). CISA's CPGs provide a baseline set of cybersecurity practices broadly applicable across all businesses with known risk-reduction value. Note: The Cyber Security Evaluation Tool (CSET) provides a guided walk-through of the CPG evaluation.
Secure by Demand (SbD) for OT. CISA's SbD guidance warns operational technology (OT) asset owners of cyber threat actors targeting vulnerabilities in products rather than specific organizations, and exploiting weak authentication, insecure settings, and outdated protocols. To address this, the guidance recommends OT asset owners procure products designed with SbD principles that include secure configurations, robust logging, open standards, data protection, and strong authentication. By selecting SbD products, organizations can reduce their attack surface, enhance system resilience, and mitigate the high costs associated with defending compromised OT assets.