As Industrial Control Systems (ICS) advance from communicating with networks within the enterprise to interacting externally via IoT platforms and the cloud, the efficiency, effectiveness and scalability, have improved. However, these advances’ create additional complexity and created a larger attack surface which in turn has increased the opportunity for cyber-attacks.
Get started by reading CSA’s glossary for Industrial Control Systems.
The intended audience includes everyone from the board to security staff inside an organization to customers and third-party suppliers including cloud service providers. CSA wanted to help provide a common language by bringing together the terms and definitions in one document. Ultimately we hope this glossary will help minimize misinterpretation and provide a common ICS and IT/OT language.
This working group aims to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems.
No Meetings Currently Scheduled
Working Group Leadership
Industrial Control Systems Security
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary
The Industrial Control Systems (ICS) Security Glossary is a reference document that brings together ICS and IT/OT related terms and definitions. Bringing together the terms and definitions in this document is meant to minimize misinterpretation and provide a common ICS and IT/OT language. A balance has been struck between length of the definitions and understandability with reliance on the reference source as the final arbiter. The goal is to provide a common language to communicate, understand, debate, conclude, and present the results of the ICS WG’s work. The intended audience is everyone from the Board to security staff inside an organization to customers and third-party suppliers including cloud service providers.