- W32.Stuxnet Dossier
- CRASHOVERRIDE - Analysis of the Threat to Electric Grid Operations
- TRISIS Malware - Analysis of Safety System Targeted Malware
- Strategic Overview of the Fuxnet Malware
- THE STATE OF OT SECURITY: A COMPREHENSIVE GUIDE TO TRENDS, RISKS, & CYBER RESILIENCE
- CISA - DEFENDING OT OPERATIONS AGAINST ONGOING PRO-RUSSIA HACKTIVIST ACTIVITY
- IEC 61131-3
- TCP-Enabled Data Diode
- MODBUS/TCP Security
- IEC 62351
- BACnet Secure Connect
- Cyber-Informed Engineering Implementation Guide
- SANS - The Five ICS Cybersecurity Critical Controls
- OT Security Dozen: Series on Building an OT/ICS Cybersecurity Program
- New network code on cybersecurity for EU electricity sector
- NIST IR 8183A Vol. 1 - Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance
- IEC 62443
- The International Electrotechnical Commission Designates ISA/IEC 62443 as a Horizontal Standard
- IEC TC 9 Electrical equipment and systems for railways
- A major step for railways cybersecurity: the new CLC/TS 50701
- IEC 81001-5-1:2021 Health software and health IT systems safety, effectiveness and security
- ISA99 committee updates community on activities and plans for ISA/IEC-62443 standards
- Applying ISO/IEC 27001/2 and the ISA/IEC 62443 Series for Operational Technology Environments
- Quick Start Guide: An Overview of ISA/IEC 62443 Standards Security of Industrial Automation and Control Systems
- UITP - PRACTICAL GUIDANCE ON CYBERSECURITY REQUIREMENTS IN TENDERING
- NIST SP 800-82 Rev. 3 - Guide to Operational Technology (OT) Security
- NIST Cybersecurity Framework
- Crown Jewels Analysis (CJA) for Industrial Control Systems (ICS)
- MITRE ATT&CK
- MITRE ATT&CK for ICS
- MITRE ATT&CK Navigator
- MITRE EMB3D Threat Model
- Microsoft Threat Modeling Tool
- CIS Benchmarks List
- Secure PLC Coding Practices: Top 20 List
- Validated Designs for Digital Manufacturing - Converged Plantwide Ethernet (CPwE)
- Industrial Networks Design Guides Proven Architectures with Design and Implementation Guidance
- SANS ICS410 SCADA Reference Model
- The Industrial Internet Reference Architecture
- Industrial Internet Security Framework
- What is a digital twin?
- Azure Digital Twins
- How Digital Twins Could Protect Manufacturers From Cyberattacks
- Goldilock
- ICS/OT Secure Remote Access
- Sysmon
- Forescout Comprehensive Medical Device Security
- T-Pot - The All In One Multi Honeypot Platform
- CONPOT ICS/SCADA Honeypot
- tcp-honeypot.py
- Arkime
- Suricata
- Zeek
- Zeek Industrial Control Systems Network Protocol Parsers (ICSNPP)
- ICS PCAPs
- Wireshark
- NetworkMiner
- The FireEye OT-CSIO: An Ontology to Understand, Cross-Compare, and Assess Operational Technology Cyber Security Incidents
- NOZOMI Risk & Vulnerability Management for OT & IoT Devices
- Tenable OT Security
- CISA Cybersecurity Alerts & Advisories
- ISASecure Certifications
- IoT Security Maturity Model (SMM):Description and Intended Use
- IoT Security Maturity Model Digital Twin Profile
- IoT Security Maturity Model: ISA/IEC 62443 Mappings for Asset Owners, Product Suppliers and System Integrators
- NESCOR Guide to Penetration Testing for Electric Utilities
- OSSTMM v3 – The Open Source Security Testing Methodology Manual
- MITRE Caldera
- MITRE Caldera for OT Plugins
- SANS Cyber Security Summits
- SANS Cybersecurity Courses & Certifications
- ISA/IEC 62443 Cybersecurity Certificate Program
This page looks best with JavaScript enabled