CISA Industrial Control Systems (ICS) Security Guidance
CISA, through its Industrial Control Systems Cyber Emergency Response Team (ICS‑CERT), publishes a continuous set of security resources for operational technology. This includes ICS‑CERT Advisories (vulnerability disclosures), Recommended Practices (RP‑1, RP‑2, etc.), Vulnerability Reports, Technical Documents, and Security Alerts, all aimed at improving the security of industrial control and SCADA systems.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (19)
Access Control
| Code | Title |
|---|---|
| ICS-10 | Identity and Access for ICS |
Access Control and Authentication
FedRAMP-specific access control and identification/authentication requirements
| Code | Title |
|---|---|
| CJIS-4 | Access Control |
| CJIS-5 | Identification and Authentication |
| CJIS-6 | Account Management |
| FEDRAMP-AC-1 | Access Control Policy and Procedures |
| FEDRAMP-AC-17 | Remote Access |
| FEDRAMP-AC-2 | Account Management |
| FEDRAMP-AC-3 | Access Enforcement |
| FEDRAMP-AC-4 | Information Flow Enforcement |
| FEDRAMP-AC-6 | Least Privilege |
| FEDRAMP-IA-1 | Identification and Authentication Policy |
| FEDRAMP-IA-2 | Identification and Authentication (Organizational Users) |
| FEDRAMP-IA-5 | Authenticator Management |
| FEDRAMP-IA-8 | Identification and Authentication (Non-Organizational Users) |
| ICS-AC-1 | Role-based access control |
| ICS-AC-2 | Authentication mechanisms |
| ICS-AC-3 | Account management |
| ICS-AC-4 | Physical access controls |
| NIS2-IA-11 | Access Control Policy |
| NIS2-IA-12 | Multi-Factor Authentication |
Asset Management
| Code | Title |
|---|---|
| ICS-1 | ICS Asset Inventory |
Change Management
| Code | Title |
|---|---|
| ICS-17 | Change Management for ICS |
Detection
| Code | Title |
|---|---|
| ICS-18 | Logging and Monitoring of ICS Assets |
| ICS-7 | OT Network Monitoring |
Endpoint Security
| Code | Title |
|---|---|
| ICS-14 | Engineering Workstation Controls |
| ICS-4 | Removable Media Controls |
| ICS-8 | Hardening ICS Endpoints |
Governance
| Code | Title |
|---|---|
| ICS-20 | Safety and Cybersecurity Convergence |
Incident Response
| Code | Title |
|---|---|
| ICS-13 | Incident Response for OT |
Incident Response and Recovery
| Code | Title |
|---|---|
| AWWA-5.1 | Incident Response Plan |
| AWWA-5.2 | Incident Detection and Analysis |
| AWWA-5.3 | Business Continuity and Disaster Recovery |
| AWWA-5.4 | Backup and Restoration |
| AWWA-5.5 | Exercises and Testing |
| ICS-IR-1 | ICS incident response plan |
| ICS-IR-2 | ICS-specific forensics |
| ICS-IR-3 | Backup and recovery procedures |
| ICS-IR-4 | Coordination with ICS-CERT |
Network Security
| Code | Title |
|---|---|
| ICS-15 | Wireless Network Controls in OT |
| ICS-2 | Network Segmentation Between IT and OT |
Network Security and Segmentation
| Code | Title |
|---|---|
| ICS-NS-1 | Network segmentation |
| ICS-NS-2 | Defence-in-depth architecture |
| ICS-NS-3 | Remote access security |
| ICS-NS-4 | Wireless security |
| ICS-NS-5 | Network monitoring and intrusion detection |
Operational
| Code | Title |
|---|---|
| ICS-16 | Time Synchronization for ICS |
Patch Management and System Hardening
| Code | Title |
|---|---|
| ICS-PM-1 | ICS patch management programme |
| ICS-PM-2 | System hardening |
| ICS-PM-3 | Change management |
| ICS-PM-4 | Security awareness training |
| ICS-PM-5 | Vendor advisory monitoring |
Physical Security
| Code | Title |
|---|---|
| ICS-11 | Physical Security of ICS |
Remote Access
| Code | Title |
|---|---|
| ICS-19 | Vendor Remote Access |
| ICS-3 | Secure Remote Access for OT |
Resilience
| Code | Title |
|---|---|
| ICS-9 | Backup and Restore for ICS |
Risk Assessment and Asset Management
| Code | Title |
|---|---|
| ICS-RA-1 | ICS asset inventory |
| ICS-RA-2 | Network architecture mapping |
| ICS-RA-3 | Risk assessment methodology |
| ICS-RA-4 | Vulnerability identification and management |
Supply Chain
| Code | Title |
|---|---|
| ICS-12 | Supply Chain Risk for ICS Components |
Vulnerability Management
| Code | Title |
|---|---|
| ICS-5 | Patch Management for ICS |
| ICS-6 | Subscribe to and Action ICS Advisories |
Your Compliance Coverage
If you comply with CISA Industrial Control Systems (ICS) Security Guidance, you already cover:
TISAX - Trusted Information Security Assessment Exchange
37%
23 controls mapped
Compare →AWWA Cybersecurity Guidance for the Water Sector (American Water Works Association)
37%
23 controls mapped
Compare →Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1
35%
22 controls mapped
Compare →+ 646 more: NIST SP 800-82 Rev 3 - Guide to OT Security (35%), NIS2 Directive Implementing Acts (35%)
See all 649 mapped frameworks ↓Maps to 649 other frameworks
Frequently Asked Questions
What is CISA Industrial Control Systems (ICS) Security Guidance?
CISA Industrial Control Systems (ICS) Security Guidance is a compliance framework from United States (CISA) with 19 domains and 62 controls. CISA, through its Industrial Control Systems Cyber Emergency Response Team (ICS‑CERT), publishes a continuous set of security resources for operational technology. This includes ICS‑CERT Advisories (vulnerability disclosures), Recommended Practices (RP‑1, RP‑2, etc.), Vulnerability Reports, Technical Documents, and Security Alerts, all aimed at improving the security of industrial control and SCADA systems. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CISA Industrial Control Systems (ICS) Security Guidance have?
CISA Industrial Control Systems (ICS) Security Guidance has 62 controls organised across 19 domains. The largest domains are Access Control and Authentication (19 controls), Incident Response and Recovery (9 controls), Network Security and Segmentation (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CISA Industrial Control Systems (ICS) Security Guidance map to?
CISA Industrial Control Systems (ICS) Security Guidance maps to 649 other compliance frameworks. The top mapping partners are TISAX - Trusted Information Security Assessment Exchange (37% coverage), AWWA Cybersecurity Guidance for the Water Sector (American Water Works Association) (37% coverage), Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 (35% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with CISA Industrial Control Systems (ICS) Security Guidance compliance?
Start your CISA Industrial Control Systems (ICS) Security Guidance compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CISA Industrial Control Systems (ICS) Security Guidance requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 62 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 768 frameworks.
Get Started Free →Free forever — no credit card required