{"id":1421,"date":"2023-11-02T11:25:20","date_gmt":"2023-11-02T11:25:20","guid":{"rendered":"https:\/\/inprotech.es\/?p=1421"},"modified":"2025-02-17T10:34:39","modified_gmt":"2025-02-17T10:34:39","slug":"ot-nist-sp-800-82-introduction-and-3rd-revision","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/","title":{"rendered":"OT NIST SP 800-82: introduction and 3rd revision"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The<strong> National Institute of Standards and Technology (NIST)<\/strong> is an agency of the United States Department of Commerce. It was founded in 1901 under the name of the National Bureau of Standards (NBS) with just a metrological task such as the custody of the physical objects embodying the standards for the kilogram and the meter, or the development of measuring instruments for electricity and light. Over the years its mission shifted towards technological development following the war campaigns of the first third of the 20th century until in 1988 the agency was renamed NIST with the official mission of &#8220;promoting innovation and industrial competitiveness in the United States by advancing measurement science, standards and technology to improve the economic security and quality of life of Americans.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1416 aligncenter\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/unnamed.png\" alt=\"\" width=\"390\" height=\"108\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/unnamed.png 390w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/unnamed-300x83.png 300w\" sizes=\"auto, (max-width: 390px) 100vw, 390px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1418 aligncenter\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/vista-de-las-oficinas-del-NIST-en-Gaithersburg-MD.jpg\" alt=\"vista de las oficinas del NIST en Gaithersburg, MD\" width=\"530\" height=\"330\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/vista-de-las-oficinas-del-NIST-en-Gaithersburg-MD.jpg 530w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/vista-de-las-oficinas-del-NIST-en-Gaithersburg-MD-300x187.jpg 300w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Part of this task is the publication of research and standard guides and procedures such as this NIST SP 800-82 dedicated to establishing the <strong>bases for cybersecurity of Industrial Control Systems (IDS)<\/strong> and which is, <\/span><i><span style=\"font-weight: 400;\">de facto<\/span><\/i><span style=\"font-weight: 400;\">, the reference text in this matter. Its first version was published in May 2013, a few years after the Stuxnet worm made crystal clear that it was the <strong>time to proactively secure networks and industrial complexes<\/strong>. This text quickly became obsolete and in May 2015 a second improved and expanded version emerged. Currently, a third version is published in review format, awaiting the consolidated publication with the contributions made from the community in April 2022.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article we will briefly summarize the contents of NIST SP 800-82 and discuss the updates to the latest version, NIST SP 800-82r3.\u00a0<\/span><\/p>\n<h2>Summary of NIST SP 800-82<\/h2>\n<p><span style=\"font-weight: 400;\">The main object of study of this document is, as mentioned above, ICS or Industrial Control Systems. <strong>Among the most typical components of ICS are SCADAs (supervisory control and data acquisition) systems, DCSs (distributed control systems), and PLCs (programmable logic controllers)<\/strong>. They are typically found within industrial environments: electricity, water, refineries and gasification, transportation, chemical, pharmaceutical, paper and pulp, food and beverage, and discrete manufacturing (automotive, aerospace, durable goods), and form the functional core of critical infrastructures, highly interconnected and mutually dependent systems that are considered essential for the functioning of an industrialized society. Therefore, they are elements highly protected by these societies\u2019 states and governments. In the United States, 90% of critical infrastructures are owned and managed privately, but federal agencies also manage many critical ICS, such as Postal Service or air traffic.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1412 aligncenter\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Ejemplo-de-implementacion-de-un-sistema-de-control-de-acceso-fisico.png\" alt=\"\" width=\"689\" height=\"322\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Ejemplo-de-implementacion-de-un-sistema-de-control-de-acceso-fisico.png 430w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Ejemplo-de-implementacion-de-un-sistema-de-control-de-acceso-fisico-300x140.png 300w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The ultimate objective of this NIST special publication is to summarize typical IC topologies, identify common threats and their vulnerabilities, and provide security recommendations to address the associated risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An important point to establish is the<strong> main differences with traditional IT<\/strong> (Information Technology) since its cybersecurity standards are much more mature. Traditionally, ICS were systems whose main protection was by isolation (air gap) and in which, by operating with proprietary control protocols and hyper-specialized software\/hardware, they managed to keep potential attackers at bay. In recent years, the unstoppable trend is to reduce this isolation due to the introduction of the Internet Protocol for communication within networks and the integration of industrial networks with the rest of the company&#8217;s management systems, opening the possibility of more incidents and cybersecurity vulnerabilities. Furthermore, communications are increasingly tending to be wireless, so just physical proximity to the network (not physical access) would be necessary to disrupt the system. Many of the solutions implemented to solve these problems in IT are not suitable for ICS.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another fundamental difference with IT is the<strong> interaction with the material world<\/strong>, practically nonexistent beyond the use of printers. This translates into a potential risk for the physical integrity of the people present in the plant in the event of failures or incorrect operations, as well as for the environment. Furthermore, general ICS priorities (namely: Availability, Integrity, Confidentiality) can and often do clash with IT priorities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Threats to ICSs can come from many sides: hostile governments, terrorist groups, disgruntled employees, malicious intruders, complexities, accidents, natural disasters, destructive actions from within. Some examples of incidents that could be encountered in an ICS are: blocked or slowed traffic; unauthorized changes in instructions, commands, alarm thresholds that could damage, misconfigure or shut down equipment; modification of traffic sent to operators; modified settings, virus and malware in general; interference with other systems on the network.<\/span><\/p>\n<figure id=\"attachment_1414\" aria-describedby=\"caption-attachment-1414\" style=\"width: 378px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1414\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Pasos-en-el-sistema-de-control-de-riesgos.png\" alt=\"\" width=\"378\" height=\"380\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Pasos-en-el-sistema-de-control-de-riesgos.png 378w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Pasos-en-el-sistema-de-control-de-riesgos-298x300.png 298w, https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/Pasos-en-el-sistema-de-control-de-riesgos-150x150.png 150w\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" \/><figcaption id=\"caption-attachment-1414\" class=\"wp-caption-text\">Ilustraci\u00f3n 3: Pasos en el sistema de control de riesgos de NIST SP 800-83r3<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The <strong>main objectives in an ICS implementation<\/strong> would be those listed here:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Restrict logical access to the ICS network.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Restrict physical access to the ICS network.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Protect the individual components of the ICS network: up-to-date security patches, ports and services, user roles, log review.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Restrict unauthorized modification of data, both traffic and memory.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Detect security events and incidents.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Maintain functionality during adverse conditions.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Restore the system after an incident.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u00a0The importance of having a human <strong>team focused on ICS cybersecurity is highlighted<\/strong>, compose at least of: IT, control engineer, control systems operator, network and systems security expert, a management member, member of the risk prevention team.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To finish with this small summary, the points that the defense strategy of an ICS should have are detailed, which we will only list here:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Development of security policies and procedures based on the Homeland Security Advisory System threat system.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Preparation of training material applied specifically to ICS.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Follow the security of the systems based on their life cycle, from architectural design, installation, maintenance, and confiscation.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Implementation of a network topology with several levels depending on the security or level of protection necessary.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Logical separation between corporate networks (IT) and ICS (firewalls, DMZ, unidirectional access doors).<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Redundancy of critical components.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Design critical systems taking into account the principle of fault tolerance\/graceful degradation (that the system does not break even if some of its parts do).<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Disabling unused ports and services.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Restriction of user roles and permissions to those strictly necessary.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use of separate authentication systems for the corporate network (IT) and ICS.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use of modern technology for physical access (e.g. smart cards) to take the initiative against malicious actors.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Implementation of computer security controls such as antivirus.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Application of security techniques such as encryption.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Keeping security patches up to date.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Review of the logs of the critical areas of the ICS.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use of secure and reliable network protocols.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">All the points presented in this summary are described <\/span><i><span style=\"font-weight: 400;\">in extenso<\/span><\/i><span style=\"font-weight: 400;\"> in the original document, with which any professional in the industrial branch should be at least familiar.<\/span><\/p>\n<h2>3rd review: what\u2019s new<b><br \/>\n<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>Cover more ground<\/strong>: In the title of the publication we can spot the appearance of the acronym OT, Operation Technology, which encompasses all the systems that come together in the computerized treatment of industrial systems, in which ICS are a leading element but not the only one. Examples are the IIoT (Industrial Internet of Things), the BAS (property automation systems, or building automation), physical access and control systems, the password manager and multi-factor authentication, or the control of the supply chain with respect to supplier interaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Risk control and the Zero Trust policy<\/strong>: assumes the acceptance that security incidents are going to occur, and that one must learn to identify and prioritize potential threats and vulnerabilities. In relation to this, the trend in the industry is to build architectures based on the concept of Zero Trust, according to which no device, user, or connection can access resources without passing the corresponding control. OT recognizes the complication of implementing this policy at the lowest levels of the functional organization chart of a factory (HMIs, PLCs), whose protocols are often too particular.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Alignment with other more general NIST standards<\/strong> such as the CSF (Cybersecurity Framework) or NIST 800-53r5, titled Security and Privacy Controls for Information Systems and Organizations. One of the most immediate practical implications is to give more importance to the response plan for a security incident (summarized in the mantra Identify, Protect, Detect, Respond, Recover).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As can be seen from this review, the third revision represents a broad improvement of the contents of the previous version, making the text more autonomous and versatile, and delving into a realistic management of possible malicious or disruptive events. In short, an integration of measures from the IT world, already well established and mature, but conveniently adapted to the OT environment.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce. It was founded in 1901 under the name of the National Bureau of Standards (NBS) with just a metrological task such as the custody of the physical objects embodying the standards for the kilogram and the meter,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[50,17],"tags":[],"class_list":["post-1421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategic-consulting","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OT NIST SP 800-82: introduction and 3rd revision - InprOTech<\/title>\n<meta name=\"description\" content=\"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT NIST SP 800-82: introduction and 3rd revision - InprOTech\" \/>\n<meta property=\"og:description\" content=\"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-02T11:25:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T10:34:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"OT NIST SP 800-82: introduction and 3rd revision\",\"datePublished\":\"2023-11-02T11:25:20+00:00\",\"dateModified\":\"2025-02-17T10:34:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/\"},\"wordCount\":1388,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/guia-de-seguridad-ot-nist.jpg\",\"articleSection\":[\"Strategic Consulting\",\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/\",\"name\":\"OT NIST SP 800-82: introduction and 3rd revision - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/guia-de-seguridad-ot-nist.jpg\",\"datePublished\":\"2023-11-02T11:25:20+00:00\",\"dateModified\":\"2025-02-17T10:34:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/guia-de-seguridad-ot-nist.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/guia-de-seguridad-ot-nist.jpg\",\"width\":1536,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/ot-nist-sp-800-82-introduction-and-3rd-revision\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OT NIST SP 800-82: introduction and 3rd revision\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT NIST SP 800-82: introduction and 3rd revision - InprOTech","description":"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/","og_locale":"en_US","og_type":"article","og_title":"OT NIST SP 800-82: introduction and 3rd revision - InprOTech","og_description":"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.","og_url":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/","og_site_name":"InprOTech","article_published_time":"2023-11-02T11:25:20+00:00","article_modified_time":"2025-02-17T10:34:39+00:00","og_image":[{"width":1536,"height":768,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"OT NIST SP 800-82: introduction and 3rd revision","datePublished":"2023-11-02T11:25:20+00:00","dateModified":"2025-02-17T10:34:39+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/"},"wordCount":1388,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg","articleSection":["Strategic Consulting","Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/","url":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/","name":"OT NIST SP 800-82: introduction and 3rd revision - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg","datePublished":"2023-11-02T11:25:20+00:00","dateModified":"2025-02-17T10:34:39+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"Discover how NIST SP 800-82 guides in the cybersecurity of Industrial Control Systems, evolving from its first version in 2013 to the recent revision, which incorporates risk management and aligns the ICS with broader standards, strengthening protection against modern threats in an interconnected industrial environment.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2023\/10\/guia-de-seguridad-ot-nist.jpg","width":1536,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/ot-nist-sp-800-82-introduction-and-3rd-revision\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/"},{"@type":"ListItem","position":2,"name":"OT NIST SP 800-82: introduction and 3rd revision"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=1421"}],"version-history":[{"count":2,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1421\/revisions"}],"predecessor-version":[{"id":1426,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1421\/revisions\/1426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/1424"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=1421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=1421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=1421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}