Protecting Information and System Integrity in Industrial Control System Environments

Current Status

This project is moving into the build phase. We are no longer accepting Letters of Interest from technology vendors as part of this project. We have selected several technology collaborators who have signed a Cooperative Research and Development Agreement (CRADA; see an example) with NIST.

Download the final Protecting Information and System Integrity in Industrial Control System Environments project description (PDF) for full project details.

If you have any questions or would like to join our Community of Interest, please email the project team at


Manufacturing organizations relying on industrial control systems (ICS), which monitor and control physical processes that produce goods for public consumption, are facing an increasing number of cyber attacks. As manufacturing organizations continue to converge information technology with operational technology to promote corporate business systems’ connectivity and remote access capabilities, they become more vulnerable to cybersecurity threats. Threats to manufacturing environments such as destructive malware, malicious insider activity, and even honest mistakes create the imperative for manufacturing organizations to strengthen protection of their ICS.

The NCCoE is proposing a project to provide a practical example solution to help manufacturers protect their ICS from data integrity attacks.

The NCCoE project team will leverage the National Institute of Standards and Technology (NIST) Engineering Laboratory to provide a comprehensive approach that manufacturing organizations can use to address the challenge of protecting ICS against data integrity attacks by leveraging the following cybersecurity capabilities: behavioral anomaly detection, security incident and event monitoring, ICS application white-listing, malware detection and mitigation, change control management, user authentication and authorization, access control least privilege, and file-integrity checking mechanisms.

 This project will result in a publicly available NIST Cybersecurity Practice Guide, a detailed implementation guide of the practical steps needed to implement the cybersecurity reference design that addresses this challenge.

Questions? Comments? Reach us at

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

ForeScout logo
GreenTec USA logo
OSISoft logo
Radiflow logo
TDI Technologies logo
VMware logo