2022
DOI: 10.6028/nist.sp.800-82r3.ipd
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Guide to Operational Technology (OT) Security

Abstract: All comments are subject to release under the Freedom of Information Act (FOIA).NIST SP 800-82r3 Guide to Operational Technology (OT) Security

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
23
0
3

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 1 publication
1
23
0
3
Order By: Relevance
“…Given the importance of semiconductor manufacturing globally, nation-state campaigns such as Operation Skeleton Key (Osborne 2020) against Taiwanese manufacturers underscore the need to quantify the risk of targeted, cyber-originating disruptions to semiconductor manufacturing. This aligns with recent efforts, including the SEMI Cybersecurity Standard, Specification for Malware Free Equipment Integration (SEMI 2022), as well as NIST 800-82, Guide to Operational Technology (OT) Security (Stouffer et al 2022).…”
Section: Introductionsupporting
confidence: 76%
See 1 more Smart Citation
“…Given the importance of semiconductor manufacturing globally, nation-state campaigns such as Operation Skeleton Key (Osborne 2020) against Taiwanese manufacturers underscore the need to quantify the risk of targeted, cyber-originating disruptions to semiconductor manufacturing. This aligns with recent efforts, including the SEMI Cybersecurity Standard, Specification for Malware Free Equipment Integration (SEMI 2022), as well as NIST 800-82, Guide to Operational Technology (OT) Security (Stouffer et al 2022).…”
Section: Introductionsupporting
confidence: 76%
“…Our work focuses on cyber-originating disruption models for semiconductor manufacturing and as such, augments the well-known reference model for the Intel Minifab (Kempf 1994) with concepts based on the Purdue Enterprise Reference Architecture (PERA) for Operational Technology (OT) (Williams 1994;ENISA 2018;Langill, Hegrat, and Peterson 2019). There are a variety of emerging cybersecurity standards within the industry including the SEMI Cybersecurity Standard, specification of malware-free equipment integration (SEMI 2022); the NISTIR 8183A, Cybersecurity Framework Manufacturing Profile (Stouffer et al 2019); and more generally the Guide to Operational Technology Security (NIST 800-82r3) (Stouffer et al 2022). Texas Instruments recently motivated the need for a Cyber-Physical IT assessment tool for semiconductor manufacturing companies (Cayetano et al 2018).…”
Section: Related Workmentioning
confidence: 99%
“…A DCS enables distributed control within a defined geographic area, whereas SCADA systems are used for centralised control and monitoring of geographically scattered assets (Yadav and Paul, 2021). Building automation systems (BAS), physical access control systems (PACS), and safety systems are additional ICS (Stouffer et al, 2022). Common ICS and their components are covered in this section, including the sectors in which they are typically used.…”
Section: Industrial Control Systemsmentioning
confidence: 99%
“…This issue is not a problem while dealing with an event in IT environments because, in most cases, the IT system is under the full responsibility and control of one department, the IT department. However, this is not the case in OT [2]. A primary aspect that affects incident handling in OT is the number of stakeholders (e.g., operators, maintenance teams, engineers, cyber analysts) doing some level of analysis in the system.…”
Section: Main Incident Response Challenge In Otmentioning
confidence: 99%