Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Industrial Control Systems
Share:
Photo of power plant stacks in Morro Bay, California

Industrial Control Systems

Practical tools, guidance, and up-to-date information to support asset owners and cyber defenders

CISA collaborates with the OT community to address immediate operational cyber events and long-term risk affecting ICS.

ICS Cybersecurity Challenges

Many ICS environments operate with existing “legacy” technologies and proprietary protocols due to their original design priorities, which focused on operability and reliability rather than cybersecurity. Historically, ICS environments functioned in isolated networks with limited external connectivity, reducing the perceived need for robust security measures. These systems relied heavily on vendor-specific hardware, software, and communication technologies, making them less adaptable to modern security practices. As a result, many legacy ICS devices continue to use outdated operating systems as well as older protocols that lack encryption or authentication mechanisms, leaving them vulnerable to cyber threats.

ICS and Brownfield Challenges

A cybersecurity challenge unique to ICS is brownfield deployments, which refer to the integration of new technologies or systems into existing “legacy” infrastructure. Specifically, these deployments layer legacy infrastructure with modern OT systems, such as building management systems, energy management systems, internet-of-things (IoT) devices, automation, and robotics. These modern systems commonly use protocols that support higher bandwidth, ultra-low latency, and connectivity for large fleets of devices. 

ICS stakeholders—including owners, operators, cyber defenders, and vendors—must carefully consider the nuances of these layered OT systems, networks, and environments when implementing mitigations and compensating controls that address security risks and vulnerabilities.

CISA Resources for ICS Cybersecurity

CISA offers a variety of resources—including guidance, services, tools, and training—applicable to ICS stakeholders and organizations at all levels of cybersecurity maturity. These resources include general cybersecurity and safety guidance, as well as deployable tools and shared services directly provided by CISA. The tabs at the top of this page provide information about resources that stakeholders can immediately put into practice or reference.  

The broader OT community can use these resources to raise awareness around security risks and threats to OT and ICS systems. CISA continues to collaborate with owners and operators of critical infrastructure, industry, manufacturers, information sharing and analysis centers (ISACs), and the interagency to protect vital systems and defend against our adversaries.

The following section provides ICS-related resources. Visit https://www.cisa.gov/resources-tools for the full catalogue of CISA services, tools, and products.

ICS-Related Resources

Click on the tabs to see the variety of resources CISA provides ICS stakeholders and organizations at all levels of cybersecurity maturity. 

ICS Guidance

ICS Advisories. CISA publishes ICS advisories to help organizations address ICS vulnerabilities. These advisories cover ICS cybersecurity topics and focus on mitigations that ICS vendors have published for vulnerabilities in their products. These advisories aim to reduce risks associated with exploitation of vulnerabilities affecting ICS, which can lead to data corruption, exfiltration, or significant physical consequences. CISA also publishes Medical Device Advisories that focus on on mitigations that ICS medical vendors have published for vulnerabilities in their products.

Cybersecurity Advisories (CSAs). CISA publishes CSAs to provide detection methods for exploitation and indicators of compromise in response to cyber operational events and incidents. CISA often jointly produces CSAs with relevant private and public sector partners as well as international counterparts. These advisories provide collaborative research on cyber threats and encourage critical infrastructure asset owners and cyber defenders to apply the recommended mitigations.

Internet Exposure Reduction Guidance. CISA published this guidance to help organizations proactively identify and mitigate exposures, reducing their online footprint and strengthening cybersecurity.

Cybersecurity Performance Goals (CPGs). CISA's CPGs provide a baseline set of cybersecurity practices broadly applicable across all businesses with known risk-reduction value. Note: The Cyber Security Evaluation Tool (CSET) provides a guided walk-through of the CPG evaluation.

Secure by Demand (SbD) for OT. CISA's SbD guidance warns operational technology (OT) asset owners of cyber threat actors targeting vulnerabilities in products rather than specific organizations, and exploiting weak authentication, insecure settings, and outdated protocols. To address this, the guidance recommends OT asset owners procure products designed with SbD principles that include secure configurations, robust logging, open standards, data protection, and strong authentication. By selecting SbD products, organizations can reduce their attack surface, enhance system resilience, and mitigate the high costs associated with defending compromised OT assets.

 

ICS Services

Known Exploited Vulnerabilities (KEV) Catalog. CISA's KEV catalog is the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.

Cyber Hygiene (CyHy) Services. CISA offers vulnerability scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. To sign up, email vulnerability@cisa.dhs.gov with the subject line “Requesting Cyber Hygiene Services.” Individual services include:

  • Vulnerability Scanning (VS) – The CyHy VS program scans external-facing systems and does not require administrative rights. The program generates regular reports for the organization that detail any potential vulnerabilities or other issues that should be addressed.
  • Web Application Scanning (WAS) – CISA’s CyHy Web Application Scanning is “internet scanning-as-a-service.” This service, which requires your organization also be enrolled in the VS program, assesses the “health” of your publicly accessible web applications by checking for known vulnerabilities and weak configurations. Additionally, CISA can recommend ways to enhance security in accordance with industry and government best practices and standards.

Report a Cybersecurity Incident. CISA provides a list of resources for reporting cyber incidents, phishing attempts, malware, and vulnerabilities at your organization.

Report a Vulnerability. The Vulnerability Information and Coordination Environment (VINCE) platform allows anyone to submit a product or vendor related vulnerability for review by a cyber critical emergency response team (CERT). The process allows multiple stakeholders to analyze, vet, investigate and disclose information to the public to mitigate or fix each vulnerability.

ICS Tools

CISA Cyber Security Evaluation Tool (CSET). CSET is a desktop tool that provides a step-by-step evaluation of your organization’s information technology (IT) and industrial control system (ICS) network security practices.

Logging Made Easy (LME). LME guides users through the setup of basic event logging across their domain. LME supports many systems including Windows, Linux, and macOS.

Secure Cloud Business Applications (SCuBA) Project. SCuBA provides tailored cloud solutions guidance and secure configuration baselines (SCBs) for Microsoft 365 (M365) and Google Workspace (GWS) applications. SCuBA’s guidance aims to protect information that organizations create, access, share, or store in cloud environments. Note: Although its primary goal is to help secure federal civilian executive branch (FCEB) information in cloud environments, all organizations can use SCuBA to strengthen their cybersecurity posture.

ICS Training

ICS Training. CISA offers ICS training online and in-person in partnership with Idaho National Laboratories (INL). Topics include introduction to industrial control systems, determining the impacts of a cybersecurity incident, and mapping IT defense-in-depth security solutions to ICS. 

Controls Environment Laboratory Resource (CELR). The Controls Laboratory is an environment for government and private industry partners to experience the possible effects of kinetic cyber-physical attacks. This lab allows users to perform security research on industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems.

Get In Touch!

Can’t find what you’re looking for?

Email central@cisa.dhs.gov for more information.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA contact@mail.cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback