Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

ISA/IEC 62443 Cited in CISA OT Cybersecurity Guidance

The ISA/IEC 62443 series of standards — the world's leading standards for operational technology (OT) cybersecurity — were included in a guidance document published 13 August 2025 by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)

The document, titled "Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators," provides guideposts for OT owners and operators in critical infrastructure sectors to build a modern defensible architecture. This guidance includes creating and maintaining an OT asset inventory as well as an accompanying taxonomy to reduce cyber risk and ensure mission and service continuity.

On page 9, CISA highlights ISA/IEC 62443 as its source for developing OT asset inventory taxonomies. ISA/IEC 62443 is widely trusted and used across many industries, and it sets the terms of the OT cybersecurity conversation on a global scale. This reference from CISA underlines the broad importance of this series of standards.

Quick Summary of the CISA OT Cybersecurity Guidance Document (13 August 2025)

This guidance document from CISA walks OT owners and operators through how to build an asset inventory and an OT taxonomy. In plain terms, they can start by setting the scope and goals, listing assets, capturing key details about them, grouping them into a clear taxonomy, getting data in order and implementing lifecycle management. These steps help give asset owners and operators a reliable, always-current view of their OT environment.

The document also covers what to do next: how to use, maintain and continually improve that inventory to protect an organization's most critical assets. That includes introducing OT cybersecurity and risk management best practices, supporting maintenance and reliability, tracking performance and reporting, training the workforce and driving consistent improvements over time. 

Download This Resource

The document described in this blog post is available for download from CISA at the link below.

Related Reading

Kara Phelps
Kara Phelps
Kara Phelps is the communications and public relations manager for ISA.

Related Posts

ISA/IEC 62443 Cited in CISA OT Cybersecurity Guidance

The ISA/IEC 62443 series of standards — the world's leading standards for operational technology (OT) cyb...
Kara Phelps Aug 20, 2025 7:00:00 AM

Detecting AI-Generated Phishing Attacks Targeting Industrial Control System Operators

Industrial control systems (ICS) operators have become increasingly frequent targets of cyberattacks. Fir...
Devin Partida Aug 11, 2025 12:00:00 PM

New Resources: Exploring ISA/IEC 62443, ISO/IEC 27001 and ISO/IEC 27002

The ISA Global Cybersecurity Alliance (ISAGCA) recently published two documents seeking to facilitate bet...
Kara Phelps Aug 4, 2025 7:00:00 AM