CISA and Partners Release OT Asset Inventory Guidance
Summary
Hide ▲
Show ▼
The Cybersecurity and Infrastructure Security Agency (CISA) and several international partners released new guidance to assist operational technology (OT) owners and operators in creating and maintaining comprehensive OT asset inventories and taxonomies. This guidance aims to enhance the security of critical infrastructure sectors by providing deeper visibility into OT assets, reducing risk, and ensuring operational resilience. The guidance was developed in collaboration with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Environmental Protection Agency (EPA), and cybersecurity agencies from Australia, Canada, Germany, the Netherlands, and New Zealand. OT systems are crucial for the safe and reliable operation of critical infrastructure, including water systems, energy grids, manufacturing, and transportation networks.
Timeline
-
13.08.2025 15:00 1 articles · 1mo ago
CISA and Partners Release OT Asset Inventory Guidance
On August 13, 2025, CISA, in partnership with several U.S. and international agencies, released new guidance to help OT owners and operators create and maintain comprehensive OT asset inventories. This guidance aims to enhance the security of critical infrastructure by providing deeper visibility into OT assets and reducing risk.
Show sources
- CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security — www.cisa.gov — 13.08.2025 15:00
Information Snippets
-
The guidance focuses on helping OT owners and operators create and maintain comprehensive OT asset inventories and taxonomies.
First reported: 13.08.2025 15:001 source, 1 articleShow sources
- CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security — www.cisa.gov — 13.08.2025 15:00
-
OT systems are vital for the core functionality of critical infrastructure, including process automation, instrumentation, cyber-physical operations, and industrial control systems.
First reported: 13.08.2025 15:001 source, 1 articleShow sources
- CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security — www.cisa.gov — 13.08.2025 15:00
-
The guidance was developed in collaboration with multiple U.S. and international agencies, including the NSA, FBI, EPA, and cybersecurity agencies from Australia, Canada, Germany, the Netherlands, and New Zealand.
First reported: 13.08.2025 15:001 source, 1 articleShow sources
- CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security — www.cisa.gov — 13.08.2025 15:00
-
The new guidance aligns with the Cross-Sector Cybersecurity Performance Goals and aims to improve cybersecurity posture and reduce the risk of compromise in operational environments.
First reported: 13.08.2025 15:001 source, 1 articleShow sources
- CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security — www.cisa.gov — 13.08.2025 15:00
Similar Happenings
Chinese State-Sponsored Actors Target Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group and a newly identified group named RedNovember, have been conducting sustained campaigns to compromise critical infrastructure networks worldwide. The campaigns aim to gain long-term access to telecommunications, government, transportation, lodging, and military networks. This activity has been detailed in a joint advisory by CISA, NSA, FBI, and international partners, including Canada, Australia, New Zealand, the UK, Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland, and Spain. The advisory provides intelligence on tactics used by these actors and recommends mitigations to strengthen defenses. The Czech Republic's National Cyber and Information Security Agency (NUKIB) has issued a warning instructing critical infrastructure organizations to avoid using Chinese technology or transferring user data to servers located in China. The agency has re-evaluated its risk estimate of significant disruptions caused by China, now assessing it at a 'High' level. The NUKIB has confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs. The advisory highlights concerns over the transfer of system and user data to China, potentially misused by state, military, or political interests. The Czech government previously accused China of targeting its critical infrastructure through APT 31, an allegation denied by the PRC but condemned by the US, EU, and NATO. The advisory suggests that individuals and organizations consider restricting or prohibiting the use of products and services that transfer data to China. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The threat actors have exploited vulnerabilities in Cisco, Ivanti, and Palo Alto Networks devices to gain initial access and have modified routers to maintain persistent access and pivot into other networks. The advisory also notes that the APT actors may target other devices such as Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc. RedNovember has targeted perimeter appliances of high-profile organizations globally, including defense and aerospace organizations, space organizations, and law firms. The group has breached at least two U.S. defense contractors, a European engine manufacturer, and a trade-focused intergovernmental cooperation body in Southeast Asia. RedNovember has used the Go-based backdoor Pantegana and Cobalt Strike as part of its intrusions, along with the Spark RAT and LESLIELOADER. The group has also used VPN services like ExpressVPN and Warp VPN to administer and connect to servers used for exploitation and communication.
Russian FSB-linked Hackers Exploit Cisco Smart Install Vulnerability for Cyber Espionage
Static Tundra, a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit, has been actively exploiting a seven-year-old vulnerability in Cisco IOS and IOS XE software (CVE-2018-0171) to gain persistent access to target networks. The group has been targeting organizations in telecommunications, higher education, manufacturing, and critical infrastructure sectors across multiple continents. The attacks involve collecting configuration files, deploying custom tools like SYNful Knock, and modifying TACACS+ configurations to achieve long-term access and information gathering. The FBI and Cisco Talos have issued advisories warning about the ongoing campaign, which has been active for over a year and has targeted critical infrastructure sectors in the US and abroad. The group has also increased attacks on Ukraine since the start of the war. The vulnerability allows unauthenticated, remote attackers to execute arbitrary code or trigger DoS conditions. Cisco has advised customers to apply the patch for CVE-2018-0171 or disable Smart Install to mitigate the risk. The group has also targeted networks of US state, local, territorial, and tribal (SLTT) government organizations and aviation entities over the last decade. The threat extends beyond Russia's operations—other state-sponsored actors are likely conducting similar network device compromise campaigns.