U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

Secure websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to our website. Please do not share sensitive information with us.

This is an archive
(replace .gov by .rip)

NISTIR 8183A Vol. 3

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 3 – Discrete-based Manufacturing System Use Case

Date Published: September 2019

Author(s)

Keith Stouffer (NIST), Timothy Zimmerman (NIST), CheeYee Tang (NIST), Michael Pease (NIST), Jeffrey Cichonski (NIST), Neeraj Shah (Strativia), Wesley Downard (G2)

Abstract

Keywords

computer security; Cybersecurity Framework (CSF); distributed control systems (DCS); industrial control systems (ICS); information security; manufacturing; network security; programmable logic controllers (PLC); risk management; security controls; supervisory control and data acquisition (SCADA) systems
Control Families

Access Control; Audit and Accountability; Awareness and Training; Configuration Management; Contingency Planning; Identification and Authentication; Incident Response; Maintenance; Media Protection; Personnel Security; Physical and Environmental Protection; Planning; Program Management; Risk Assessment; Assessment, Authorization and Monitoring; System and Communications Protection; System and Information Integrity; System and Services Acquisition

Documentation

Publication:
NISTIR 8183A Vol. 3 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
NISTIR 8183A Vol. 1
NISTIR 8183A Vol. 2

Related NIST Publications:
NISTIR 8183

Document History:
05/28/19: NISTIR 8183A Vol. 3 (Draft)
09/30/19: NISTIR 8183A Vol. 3 (Final)