Businesses large and small need to manage their cybersecurity risk. But every business is different. Understanding the needs of your business and applying best practices to mitigate the risks your organization faces is the best way to prevent and respond to potential threats.
NISTIR 8183, the Manufacturing Profile of the Cybersecurity Framework, can be used as a roadmap for reducing cybersecurity risk in manufacturing systems in a way that is aligned with manufacturing sector goals and industry best practices. Along with the Manufacturing Profile is a three-volume implementation guide:
NISTIR 8259, “Foundational Cybersecurity Activities for IoT Device Manufacturers” describes recommended activities related to cybersecurity that manufacturers should consider performing before their IoT devices are sold to customers.
NIST SP 800-82 Rev. 3, “Guide to Operational Technology (OT) Security” provides guidance on how to secure operational technology (OT) while addressing their unique performance, reliability, and safety requirements.
This paper provides an overview of security segmentation and presents an example of a security segmentation design using a six-step approach.
When scammers target your business, it can hurt your reputation and your bottom line. In this brochure, learn the signs of scams that target small manufacturers and when to do if you spot a scam.
Cybersecurity protects the confidentiality, integrity, and availability of your information. A cybersecurity program provides advantages for small and medium-sized manufacturers. This infographic explains the importance of managing cyber risks for manufacturers.
The Cybersecurity and Infrastructure Security Agency (CISA) captures a list of free CISA and non-CISA tools to aid in cybersecurity. Additionally, below are several free tools mapped to the NIST CSF 2.0.
The NIST Cybersecurity Framework (CSF) provides an outline for how to achieve cybersecurity outcomes, regardless of organizational size or maturity. Incorporating the functions and categories of the CSF into organizational cybersecurity policy ensures broad coverage across each of the major cybersecurity topics to manage and reduce risk.
The Manufacturing Profile offers guidance on how to implement the CSF specifically for manufacturing organizations. The Profile further tailors guidance based on impact level of system within the Manufacturing environment.
CISA offers the Cyber Security Evaluation Tool (CSET) which is a desktop software tool that guides asset owners and operators through a step-by-step process to evaluate industrial control system (ICS) and information technology (IT) network security practices.
CISA publishes cybersecurity alerts and advisories through a variety of reports to spread awareness of vulnerabilities, indicators of compromise, tactics and techniques of known threat actors, and mitigations.
CISA Tabletop Exercise Packages (CTEPs) are a comprehensive set of resources designed to assist stakeholders in conducting their own exercises. Cybersecurity, physical security, and cyber-physical convergence scenarios have been developed to test the company’s response and recovery capabilities.
CISA partnered with INL to develop training for Industrial Control Systems (ICS). Web based training is offered through the CISA Virtual Learning Portal, and instructor led training is also available. All CISA training courses are presented with no tuition cost to the attendee.
NIAP publishes a Product Compliant List of evaluated products which comply with the requirements of the National Information Assurance Partnership (NIAP) program and, where applicable, Federal Information Processing Standards (FIPS). Although this is not specifically designed for manufacturing, it is useful for identifying commercially available vendor products which have gone through a security approval process.
International Society of Automation Security Compliance Institute is a non-profit entity which certifies OT Components, Systems, and Organizations to the ISA/IEC 62443 set of standards. This provides a list of certified (according to the standard) products commonly found in manufacturing environments called ISASecure.
Malcolm is a network traffic analysis tool suite offered through a partnership between Idaho National Laboratory and CISA. It was created to support all 16 critical infrastructure sectors and contains parsers for many ICS-specific protocols.
CISA encourages reporting of cyber incidents through their Incident Reporting System.
NIST provides templates and examples of Incident Response Plans which are specific to manufacturing. Volume 2 is focused on process-based manufacturing and Volume 3 is focused on discrete-based manufacturing. Refer to Section 3.5.
NIST provides the Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT), including a flow chart, for how to perform incident handling and digital forensics specific to operational technology.
NIST provides templates and examples of System Recovery Plans which are specific to manufacturing. Volume 2 is focused on process-based manufacturing and Volume 3 is focused on discrete-based manufacturing. Refer to Section 3.6.
For additional information on cybersecurity, please contact an MEP Center or email NIST MEP at mepcyber [at] nist.gov (mepcyber[at]nist[dot]gov).