Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»National Cyber Authorities Launch OT Security Guidance
News

National Cyber Authorities Launch OT Security Guidance

Team-CWDBy Team-CWDSeptember 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


National cybersecurity agencies from seven countries, including the Five Eyes nations, have released new operational technology (OT) security guidance.

The new guidance, published on September 29, is addressed to cybersecurity practitioners working in organizations that deploy or operate OT equipment and systems.

Step-By-Step OT Security Guidance

This document is structured around five core principles to strengthen OT security:

  1. Define processes for establishing and maintaining the definitive record
  2. Establish an OT information security management programme
  3. Identify and categorise assets to support informed risk-based decisions
  4. Identify and document connectivity within your OT system
  5. Understand and document third-party risks to your OT system

The document provides step-by-step guidance, detailing the specific actions OT security teams should take to effectively apply each principle.

“OT systems keep the lights on, the water pumping, the manufacturing lines moving and our critical national services running. When these systems are compromised or disrupted, the real-world impacts affect safety, operations, the economy and even national resilience,” warned a spokesperson for the UK’s National Cyber Security Centre (NCSC), one of the guidance’s seven signatory agencies, in a public statement.

Establishing a Definitive Record of OT

The guidance defines a principles-based approach designed to help organizations create and maintain a “definitive record” of their OT environment.

This record encompasses all OT components, including individual devices, controllers, software and virtualized systems, which should be classified based on their criticality, exposure and availability requirements.

In addition to asset classification, the record incorporates best practices for mapping other key aspects of OT asset management.

This includes an assessment of connectivity, detailing how assets interact within the OT network and with external systems, the protocols in use and any operational constraints such as latency or bandwidth limitations.

The wider system architecture is also documented, covering the segmentation of zones and conduits, resilience measures like redundancy or high-availability configurations and the rationale behind critical design decisions.

Another key consideration is supply chain and third-party access, which outlines the vendors, integrators and service providers connected to the environment, how these relationships are managed and the security controls in place to protect those connections.

Finally, the document explains that the business and impact context must be clearly defined, assessing the operational, financial and safety consequences of asset or connection failures or compromises.

Alongside the UK’s NCSC, the other participating agencies include the Australian Signals Directorate (ASD), the US Cybersecurity and Infrastructure Security Agency (CISA), the Canadian Centre for Cyber Security (Cyber Centre), the FBI, New Zealand’s National Cyber Security Centre (NCSC-NZ), the Netherland’s National Cyber Security Centre (NCSC-NL) and Germany’s Federal Office for Information Security (BSI).

This document comes one month after six of the seven above mentioned countries signed the first unified OT security taxonomy.

Join our upcoming webinar, “OT Security Ecosystem for Targeted Risk Reduction and Reporting”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
Next Article Dutch Authorities Arrest Teens in Foreign Interference Case
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What are brushing scams and how do I stay safe?

December 24, 2025

What’s at stake if your employees post too much online

December 1, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.