Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance

Published

Author(s)

Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Michael J. Pease, Jeffrey A. Cichonski, Neeraj Shah, Wesley Downard

Abstract

This guide provides general implementation guidance (Volume 1) and example proof-of-concept solutions demonstrating how available open-source and commercial off-the-shelf (COTS) products could be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level. Example proof-of-concept solutions with measured network, device, and operational performance impacts for a process- based manufacturing environment (Volume 2) and a discrete-based manufacturing environment (Volume 3) are included in the guide. Manufacturers should make their own determinations about the breadth of the proof-of-concept solutions they voluntarily implement. Some important factors to consider include: company size, cybersecurity expertise, risk tolerance, and the threat landscape. The CSF Manufacturing Profile can be used as a roadmap for managing cybersecurity risk for manufacturers and is aligned with manufacturing sector goals and industry best practices. The Manufacturing Profile provides a voluntary, risk-based approach for managing cybersecurity activities and cyber risk to manufacturing systems. The Manufacturing Profile is meant to complement but not replace current cybersecurity standards and industry guidelines that the manufacturer is embracing.
Citation
NIST Interagency/Internal Report (NISTIR) - 8183A Vol. 1
Report Number
8183A Vol. 1

Keywords

Computer security, Cybersecurity Framework (CSF), distributed control systems (DCS), industrial control systems (ICS), information security, manufacturing, network security, programmable logic controllers (PLC), risk management, security controls, supervisory control and data acquisition (SCADA) systems.
Created September 30, 2019