{"id":2566,"date":"2025-05-13T08:37:42","date_gmt":"2025-05-13T08:37:42","guid":{"rendered":"https:\/\/inprotech.es\/?p=2566"},"modified":"2025-05-13T08:38:03","modified_gmt":"2025-05-13T08:38:03","slug":"five-ics-cybersecurity-critical-controls","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/","title":{"rendered":"5 ICS Cybersecurity Critical Controls"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Increasingly, industrial environments are threatened by the growing incidence of cybersecurity issues. The convergence between OT and IT networks and their growing interconnection with Internet-connected assets has increased the attack surface. This scenario requires specific security solutions for industrial environments, where business continuity and physical security are just as important as digital security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the following article written by <\/span><a href=\"https:\/\/inprotech.es\/en\/equipo\/samuel-pampillon-roa\/\"><span style=\"font-weight: 400;\">Samuel Pampill\u00f3n<\/span><\/a><span style=\"font-weight: 400;\">, a software developer at InprOTech, the \u201cFive ICS Cybersecurity Critical Controls\u201d developed by the SANS Institute\u2014a renowned organization in the field of cybersecurity\u2014will be presented. The article will also explain how InprOTech Guardian aligns with the security requirements and compliance provisions of these controls.<\/span><\/p>\n\n<h2><b>ICS cybersecurity critical controls<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">These controls were published on November 7 of 2022, by Robert M. Lee and Tim Conway. The motivation behind the creation of these controls is to address specific security challenges in industrial environments, with a focus on prevention of the NIST Cybersecurity Framework.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The five critical controls are as follows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ICS incident response plan<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Defensible architecture<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Visibility and monitoring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure remote access<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerability management<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These controls represent the minimum necessary to defend against real attacks and organizations must take additional steps to reduce risk.<\/span><\/p>\n<h3><b>Critical Control N\u00ba1: Incident response plan<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is vital that organizations have an incident response plan specifically designed for ICS. In fact, this plan should be considered the foundation of the organization&#8217;s security program, as a common mistake is to think of incident response as the final step in the program, which can result in previously implemented security controls not being aligned with the needs that incident response may demand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">OT incident response plans prioritize actions according to potential operational impact and seek to position the system to continue operating during an attack, reducing both the effect of the attack and the impact on the controlled process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A specific plan for ICS can be divided in three phases:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Determine which scenarios represents the greatest risk.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Firstly, real-world incidents should be considered, as they provide a practical and realistic basis for the potential risks affecting the industry. These scenarios should be prioritized, as they are attacks that have already occurred and are more likely to happen again.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Consider consequence-based scenarios<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">After analyzing some real-world scenarios, one or more consequence-based scenarios should be developed. That is, identify, regardless of whether a previous attack has occurred, an impact that is of concern to the organization and determine whether it could be achieved through a cyberattack, mapping out the possible actions of the attacker. It is advisable to take advantage of the experience and knowledge of the internal team, which may have information that the adversary does not know.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Putting the scenarios on the table<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once the scenarios are identified, the ICS-specific response plan includes a tabletop exercise. This consists of applying each scenario to the organization&#8217;s environments and sites (management, operations, security, etc.), working together to determine the requirements that each incident would have and defining the appropriate response.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">InprOTech&#8217;s services, together with its <\/span><b>InprOTech Guardian<\/b><span style=\"font-weight: 400;\"> product, support the creation of a response plan aligned with business needs. In addition, Guardian facilitates the generation of detailed reports that support incident investigation and analysis, enabling decisions to be made based on accurate data.<\/span><\/p>\n<h3><b>Critical control N\u00ba2: Defensible architecture<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A defensible architecture is one that, through its design and implementation, minimizes risks and facilitates the work of those responsible for its security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although there are different frameworks, from the Purdue approach to architectures based on ISA\/IEC 62443, what is essential is their correct implementation, which makes it possible to reinforce the security of the organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attributes of a defensible architecture are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identification of asset inventory<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Segmentation of environments to limit entry and exit points<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Determining when bi-directional access is needed<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ability to collect network and communications traffic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Critical event logging and analysis<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ability to establish a robust security posture that restricts unnecessary connections and eliminates non-essential devices<\/span><\/li>\n<\/ul>\n<p><b>InprOTech Guardian<\/b><span style=\"font-weight: 400;\"> offers a set of capabilities that facilitate the implementation of a defensible architecture. Its traffic blocking functionality serves as a mechanism to minimize the attack surface. In addition, thanks to the <\/span><a href=\"https:\/\/inprotech.es\/en\/air-watcher-wireless-discovery-in-guardian\/\"><span style=\"font-weight: 400;\">AirWatcher<\/span><\/a><span style=\"font-weight: 400;\"> functionality, it can detect wireless devices, which allows monitoring and preventing unwanted access that could compromise the security of the infrastructure.<\/span><\/p>\n<h3><b>Critical Control N\u00ba3: Network visibility and monitoring\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Network monitoring is necessary to understand the interactions between ICS systems. Having visibility of what is happening in the network is vital, as it allows data collection and detection of risk scenarios associated with critical control N\u00ba1, continuous validation of the architecture described in critical control N\u00ba2 and the improvement and implementation of controls N\u00ba4 and N\u00ba5 below.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, industrial environments are becoming increasingly complex, so having broad visibility and monitoring of the network will facilitate root cause analysis of a potential incident, saving investigation costs.<\/span><\/p>\n<p><b>InprOTech Guadian<\/b><span style=\"font-weight: 400;\"> is uniquely integrated with Critical Control N\u00ba3 providing extensive network visibility and monitoring capabilities. Its capabilities allow:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Inventory and complete visualization:<\/b><span style=\"font-weight: 400;\"> Identifies all assets and their communications and generates a network map that illustrates the architecture and connection between components.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Anomaly detection:<\/b><span style=\"font-weight: 400;\"> Monitors network traffic, alerting to suspicious patterns and detecting anomalous behaviour, both external and internal.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proactive prevention:<\/b><span style=\"font-weight: 400;\"> Employs technologies such as honeypots to identify and analyse targeted attacks before they affect operations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Traffic blocking: <\/b><span style=\"font-weight: 400;\">Restricts unauthorized communication flows, reducing the attack surface.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Event correlation and analysis in ICS:<\/b><span style=\"font-weight: 400;\"> Integrates solutions that enable comprehensive analysis of security events, strengthening critical infrastructure.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These features make <\/span><b>InprOTech Guardian<\/b><span style=\"font-weight: 400;\"> a comprehensive solution that enhances network visibility and control, essential pillars of any industrial security strategy.<\/span><\/p>\n<h3><b>Critical control N\u00ba4: secure remote access<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The digitization of ICS systems and business demands have driven increased use of remote connectivity. In some cases, this connectivity may not be necessary, and it is possible to limit or eliminate it. However, in most industrial organizations it is unavoidable. Remote connectivity brings significant business and operational benefits, but it also carries significant risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To mitigate these risks and ensure remote access, it is recommended to implement multi-factor authentication (MFA), which is securely applicable in most ICS environments. It is critical to focus on applying MFA on those connections that are externally accessible. And in situations where MFA is not feasible, organizations should establish appropriate compensating controls.<\/span><\/p>\n<h3><b>Critical control N\u00ba5: Vulnerability management<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Finally, it is necessary to have a vulnerability management program in the ICS systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the OT environment, systems have a considerably longer life cycle compared to IT environments. This means that detected vulnerabilities can persist for long periods of time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerabilities that represent a risk in the ICS are those that allow an attacker to gain access to the ICS or to introduce functionalities that affect its correct functioning.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It should be kept in mind that the approach to vulnerability management in ICS should not be limited to patching, as this option is often not feasible without disrupting critical processes. Instead, the objective should be broader: identify relevant vulnerabilities, prioritize their treatment based on operational impact, implement mitigation measures when patching is not possible, and establish continuous monitoring of their possible exploitation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This approach allows maintaining a balance between security and operational continuity, which is essential in industrial environments.<\/span><\/p>\n<p><b>InprOTech Guardian<\/b><span style=\"font-weight: 400;\"> also offers a solution for this critical control, as it can perform vulnerability scans on network asset services. This provides the necessary information to identify, locate and address the different vulnerabilities of the infrastructure.<\/span><\/p>\n<h2><b>InprOTech Guardian<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">InprOTech Guardian is a cybersecurity tool specifically designed and developed to protect industrial networks. Its main objective is to monitor the traffic generated in production environments and analyse it based on a combination of static rules, an IDS and artificial intelligence and honeypots, which allows learning from network behaviour and detecting anomalies. This approach makes it possible to effectively identify threats and issue real-time alerts, directly notifying plant managers and\/or operators of possible attacks or operational failures, thus anticipating and reducing their impact.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these capabilities make <\/span><b>InprOTech GUARDIAN<\/b><span style=\"font-weight: 400;\"> the ideal tool to address the critical controls mentioned above.\u00a0<\/span><\/p>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The five ICS Critical Cybersecurity Controls provide an essential roadmap for critical infrastructure organizations to guide their cybersecurity investments and operations. Implemented in a coordinated and prioritized manner, these controls enable you to build a robust security program that adapts to the real risks of the industrial environment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this framework, <\/span><b>InprOTech Guardian<\/b><span style=\"font-weight: 400;\"> empowers the strategy by providing comprehensive visibility, proactive detection and vulnerability scanning, facilitating threat-informed decision making. In this way, organizations can optimize their resources, ensuring an appropriate response to identified threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">True to our principles, InprOTech remains committed to improving and democratizing access to cybersecurity in industrial environments.<\/span><\/p>\n<h2><b>Resources<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">[1] <\/span><a href=\"https:\/\/inprotech.es\/en\/guardian\/\"><span style=\"font-weight: 400;\">Guardian &#8211; InprOTech<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[2] <\/span><a href=\"https:\/\/ciso2ciso.com\/wp-content\/uploads\/2023\/09\/SANS_5_Critical_Controls.pdf\"><span style=\"font-weight: 400;\">SANS_5_Critical_Controls.pdf<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[3] <\/span><a href=\"https:\/\/www.itsecuritylocksmith.co.uk\/cybersecurity-critical-controls\/\"><span style=\"font-weight: 400;\">Cybersecurity critical controls<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[4] <\/span><a href=\"https:\/\/www.nist.gov\/system\/files\/documents\/2018\/12\/10\/frameworkesmellrev_20181102mn_clean.pdf\"><span style=\"font-weight: 400;\">Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Increasingly, industrial environments are threatened by the growing incidence of cybersecurity issues. The convergence between OT and IT networks and their growing interconnection with Internet-connected assets has increased the attack surface. This scenario requires specific security solutions for industrial environments, where business continuity and physical security are just as important as digital security. In the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 ICS Cybersecurity Critical Controls - InprOTech<\/title>\n<meta name=\"description\" content=\"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 ICS Cybersecurity Critical Controls - InprOTech\" \/>\n<meta property=\"og:description\" content=\"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-13T08:37:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-13T08:38:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"5 ICS Cybersecurity Critical Controls\",\"datePublished\":\"2025-05-13T08:37:42+00:00\",\"dateModified\":\"2025-05-13T08:38:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/\"},\"wordCount\":1454,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/44.jpg\",\"articleSection\":[\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/\",\"name\":\"5 ICS Cybersecurity Critical Controls - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/44.jpg\",\"datePublished\":\"2025-05-13T08:37:42+00:00\",\"dateModified\":\"2025-05-13T08:38:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/44.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/44.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/five-ics-cybersecurity-critical-controls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 ICS Cybersecurity Critical Controls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 ICS Cybersecurity Critical Controls - InprOTech","description":"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/","og_locale":"en_US","og_type":"article","og_title":"5 ICS Cybersecurity Critical Controls - InprOTech","og_description":"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.","og_url":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/","og_site_name":"InprOTech","article_published_time":"2025-05-13T08:37:42+00:00","article_modified_time":"2025-05-13T08:38:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"5 ICS Cybersecurity Critical Controls","datePublished":"2025-05-13T08:37:42+00:00","dateModified":"2025-05-13T08:38:03+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/"},"wordCount":1454,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg","articleSection":["Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/","url":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/","name":"5 ICS Cybersecurity Critical Controls - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg","datePublished":"2025-05-13T08:37:42+00:00","dateModified":"2025-05-13T08:38:03+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"Learn about the 5 ICS Critical Cybersecurity Controls and how InprOTech Guardian helps implement them in industrial environments.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/05\/44.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/five-ics-cybersecurity-critical-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/"},{"@type":"ListItem","position":2,"name":"5 ICS Cybersecurity Critical Controls"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=2566"}],"version-history":[{"count":2,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2566\/revisions"}],"predecessor-version":[{"id":2569,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2566\/revisions\/2569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/2564"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=2566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=2566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=2566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}