Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Industrial Control Systems
Share:
Computers in front of infrastructure setting

Industrial Control Systems

CISA is committed to working with the industrial control systems (ICS) community to address urgent operational cyber events as well as long-term ICS risk.

Industrial Control Systems

  • Downloading and Installing CSET
  • ICS Training Calendar

Critical infrastructure (CI) across all sectors depend on control systems for safe and efficient operation. Advancing the security and resilience of industrial control systems (ICS) is one of CISA’s top priorities. As the lead federal agency responsible for helping CI partners manage ICS security risk, we partner with government and industry to deploy the technologies and practices that will guard critical infrastructure from the threats of today, while building innovative capabilities to defend against emerging threats on the horizon.

The security of industrial control systems is among the most important aspects of our collective effort to defend cyberspace. As ever, CISA remains committed to working with the industrial control systems (ICS) community to address both urgent operational cyber events and long-term ICS risk. While the ICS risk landscape evolves, this truth remains: the only way the nation can permanently shift the cybersecurity advantage to ICS cyber defenders is through collective action.

CISA’s efforts to reduce cyber risk to control systems center around four core priorities.

  1. We must defend ICS environments against the most urgent threats.
  2. Find and defeat adversaries before they cause harm. CISA and its partners will work together to improve visibility in OT environments so that we identify and defeat malicious activity quickly before it causes wide-spread harm.
  3. We must equip critical infrastructure owners and operators and cyber defenders with the technologies and tools required to dramatically raise adversary time, costs, and technical barriers.
  4. Finally, we must sustain operational resilience by addressing systemic weaknesses to better enable control systems to withstand cyber incidents with minimal impact to critical infrastructure.
Icon of binary code with a shield in front

Report a Vulnerability

Report an ICS vulnerability using CISA's vulnerability disclosure platform, VINCE.

Report

Featured Content

Learn about important initiatives that support and protect our vital industrial control systems.

STOCK -Cyber Alert and Advisory

ICS Advisories

Stay up-to-date with CISA's ICS Advisories for timely notifications and information about current security issues, vulnerabilities, exploits, and threats.

ICS Training

CISA offers free in-person and virtual ICS training courses and workshops to the community.

Secure by Demand

Secure by Demand Guide

In this guidance, we lay out questions and resources that organizations buying software can use to better understand a software manufacturer's approach to cybersecurity and ensure that the manufacturer makes secure by design a core consideration.

ChemLock Resources icon

Control Environment Laboratory Resource (CELR)

CISA sponsored simulated environment for cybersecurity research on operational technology. Contact CELR

News and Alerts

Check out the latest blogs, press releases, and alerts and advisories from CISA.

Read More

Siemens SCALANCE W700

FEB 13, 2025 | ICS ADVISORY | ICSA-25-044-09

Qardio Heart Health IOS and Android Application and QardioARM A100

FEB 13, 2025 | ICS MEDICAL ADVISORY | ICSMA-25-044-01

Dingtian DT-R0 Series

FEB 13, 2025 | ICS ADVISORY | ICSA-25-044-18

Outback Power Mojave Inverter

FEB 13, 2025 | ICS ADVISORY | ICSA-25-044-17
Read More

Helpful Resources

Use CISA's resources to gain important ICS knowledge and skills.

More Resources

Stuff Off Search

AUG 03, 2021 | PUBLICATION
View Files
An icon showing services and programs on a computer

The KEV Catalog

PUBLICATION
A list of Known Exploited Vulnerabilities.
View Files

Coordinated Vulnerability Disclosure Process

Guidance and Strategies to Protect Network Edge Devices

FEB 04, 2025 | EXTERNAL, PUBLICATION
View Files
More Resources

Services and Training

CISA offers a variety of services and training to support industrial control systems.

Graphic for Free Non-CISA Cybersecurity services

Free Cybersecurity Services & Tools

In addition to offering a range of CISA-provided cybersecurity services, CISA has compiled a list of open source software and freeware to help organizations advance their security capabilities.

Stakeholder Exercises

INCREASE YOUR RESILIENCE
Contact: cisa.exercises@mail.cisa.dhs.gov
Consultation and planning with a range of stakeholders to develop and conduct preparedness exercises.
Go to CISA Exercises
Foundational, Intermediate, Advanced
Cyber cityscape with blue glowing dots connected by blue lines

ICS Training Available Through CISA

We offer several online training courses via the CISA Training Virtual Learning Portal (VLP)

Automated Indicator Sharing (AIS)

Get In Touch!

Can’t find what you’re looking for?

Email central@cisa.dhs.gov for more information.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback