Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»US and Australia Issue Guidance for Secure AI in Infrastructure
News

US and Australia Issue Guidance for Secure AI in Infrastructure

Team-CWDBy Team-CWDDecember 4, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


US and international cybersecurity agencies have issued new guidance to help critical infrastructure operators safely incorporate AI into operational technology (OT) systems. 

Published on December 3, the guidance was developed collaboratively by the US Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Signals Directorate’s Australian Cyber Security Centre, with input from international partners including the UK’s National Cyber Security Centre (NCSC).

The document focuses on AI tools such as machine learning (ML), large language models (LLMs) and AI agents, while remaining applicable to traditional logic-based and statistical automation systems.

It addresses both the potential efficiency and cost benefits of AI alongside the unique security and safety challenges it introduces in OT environments.

Key Principles for AI Security in OT Environments 

As per the guide, critical infrastructure operators are encouraged to:

  • Understand AI risks and promote secure development practices among personnel

  • Assess AI use in OT environments, including data security and integration challenges

  • Establish governance frameworks for ongoing model testing and regulatory compliance

  • Embed safety and security practices, maintaining transparency and incident response integration

The guidance also emphasizes protecting sensitive OT data. This includes engineering configuration information, such as schematics and asset inventories, as well as ephemeral data, such as process measurements, which may be exposed when used to train AI models.

Read more on AI governance: BSI Warns of Looming AI Governance Crisis

The cyber agencies also noted how OT vendors are increasingly embedding AI directly into devices. Because of this, the guidance recommends operators demand transparency regarding AI functionality, software supply chains, and data usage policies. 

Integration challenges include system complexity, cloud security risks, latency constraints and ensuring compatibility with legacy OT systems.

Operators should employ testing in controlled environments, maintain human-in-the-loop oversight and update AI models regularly to prevent errors and maintain safety.

Oversight, Compliance and Safety

Human oversight remains central to AI-enabled OT systems, the report warned. Monitoring AI outputs, detecting anomalies and maintaining fail-safe mechanisms are critical to ensuring operational reliability. 

Operators are also urged to align AI integration with existing cybersecurity frameworks, conduct regular audits and adhere to evolving international AI standards.

“The integration of AI into OT presents both opportunities and risks to critical infrastructure owners and operators,” CISA commented.

“By adhering to these principles and continuously monitoring, validating and refining AI models, critical infrastructure owners and operators can achieve a balanced integration of AI into the OT environments that control vital public services.” 



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware
Next Article 3 SOC Challenges You Need to Solve Before 2026
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

What is it, and how do I get it off my device?

September 11, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.