Protecting Information and System Integrity in Industrial Control System Environments

Download the Draft Practice Guide

The NCCoE has released the draft version of NIST Cybersecurity Practice Guide SP 1800-10, Protecting Information and System Integrity in Industrial Control System Environments. Click the button below to view the entire guide or scroll down for links to specific sections.

Download PDF » Comment »

Current Status

The NCCoE has released draft NIST Cybersecurity Practice Guide SP 1800-10, Protecting Information and System Integrity in Industrial Control System Environments, for public comment until November 7, 2021. The project team will consider each comment to further strengthen the usefulness of the guide.

The draft guide is available for download by specific volumes:

  • SP 1800-10A: Executive Summary (PDF)
  • SP 1800-10B: Approach, Architecture, and Security Characteristics (PDF)
  • SP 1800-10C: How-to Guides (PDF)

Or download the complete guide (PDF).

Join Our Community of Interest

To receive updates and news about this project, join the Manufacturing Community of Interest. 


Manufacturing organizations relying on industrial control systems (ICS), which monitor and control physical processes that produce goods for public consumption, are facing an increasing number of cyber attacks. As manufacturing organizations continue to converge information technology with operational technology to promote corporate business systems’ connectivity and remote access capabilities, they become more vulnerable to cybersecurity threats. Threats to manufacturing environments such as destructive malware, malicious insider activity, and even honest mistakes create the imperative for manufacturing organizations to strengthen protection of their ICS.

The NCCoE is proposing a project to provide a practical example solution to help manufacturers protect their ICS from data integrity attacks.

The NCCoE project team will leverage the National Institute of Standards and Technology (NIST) Engineering Laboratory to provide a comprehensive approach that manufacturing organizations can use to address the challenge of protecting ICS against data integrity attacks by leveraging the following cybersecurity capabilities: behavioral anomaly detection, security incident and event monitoring, ICS application white-listing, malware detection and mitigation, change control management, user authentication and authorization, access control least privilege, and file-integrity checking mechanisms.

This project will result in a publicly available NIST Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement the cybersecurity reference design that addresses this challenge.

Questions? Comments? Reach us at

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

ForeScout logo
GreenTec USA logo
TDI Technologies logo
VMware logo