← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 90/100

Operational Technology — NIST SP 800-82 Rev. 3

NIST SP 800-82 Revision 3’s July 9, 2024 release expands OT security guidance for ICS, IIoT, and distributed energy resources, requiring asset owners to realign architectures, monitoring, and procurement with CSF 2.0 and ISA/IEC 62443 controls.

Accuracy-reviewed by the editorial team

Cybersecurity pillar illustration for Zeph Tech briefings
Cybersecurity threat, control, and response briefings

NIST released Special Publication 800-82 Revision 3, Guide to Operational Technology (OT) Security, on 9 July 2024. The revision is the first update since 2015 and reflects eight years of evolution in industrial control systems (ICS), industrial internet of things (IIoT), distributed energy resources (DER), and converged IT/OT environments. It aligns OT security with the NIST Cybersecurity Framework 2.0, introduces architectural patterns for zero trust, emphasizes supply chain risk management, and expands coverage of cloud, virtualization, and remote access technologies. Asset owners, integrators, and vendors must revisit OT governance models, detection telemetry, and procurement specifications to match the new baseline.

Revision 3 includes expanded sections on OT risk assessments, lifecycle security integration, secure configuration management, and incident response. It maps OT controls to NIST SP 800-53 Revision 5, SP 800-161r1 for supply chain, and SP 800-207 for zero trust. It addresses DER integration with smart grids, building automation, transportation systems, and manufacturing robotics. NIST highlights the need for asset inventories, segmentation, network monitoring, and secure remote access with multifactor authentication and privileged access management. The guide also stresses workforce training, tabletop exercises, and collaboration between IT security teams and control engineers.

Key updates in Revision 3

  • Alignment with CSF 2.0: Each recommended control now references CSF functions and categories, aiding executive reporting and cross-framework harmonization.
  • Zero trust architectures: Guidance on applying zero trust principles within OT networks, including identity-centric access, microsegmentation, and continuous monitoring of trust signals.
  • Cloud and virtualization: Coverage of OT workloads hosted in cloud or virtualized environments, including considerations for hypervisors, container orchestration, and managed OT services.
  • Distributed energy resources and IIoT: Expanded discussion on integrating DER, smart inverters, building management systems, and IIoT sensors, with emphasis on communications security and lifecycle management.
  • Supply chain security: Integration with SP 800-161r1, recommending supplier vetting, firmware integrity checks, SBOMs, and secure update processes.
  • Incident response and resilience: Enhanced playbooks for coordinated IT/OT response, including kill switch procedures, manual overrides, and recovery prioritization.

Control mapping for setup

  • NIST SP 800-53 Rev. 5: Map OT controls to families such as AC (Access Control), AU (Audit and Accountability), CM (Configuration Management), IR (Incident Response), and SI (System and Information Integrity) with OT-specific overlays.
  • NIST CSF 2.0: Align OT asset management with ID.AM, protective technology with PR.PT, detection with DE.CM, response with RS, and recovery with RC functions.
  • ISA/IEC 62443: Cross-reference security levels (SL) and requirements such as SR 1 (Identification and Authentication Control), SR 3 (System Integrity), and SR 5 (Restricted Data Flow) to ensure compatibility with vendor certifications.
  • NERC CIP, TSA, and sector regs: Use Revision 3 guidance to satisfy CIP-005 (electronic security perimeters), CIP-007 (systems security management), pipeline security directives, and aviation maritime security advisories.
  • CISA Cross-Sector Cybersecurity Performance Goals: Adopt recommended practices for asset inventory, vulnerability management, incident response, and remote access oversight.

Rollout plan

PhaseTimelineActivities
AssessmentWeeks 1–4Review Revision 3, perform gap analysis against existing OT security programs, inventory assets, communication paths, and remote access channels.
DesignWeeks 5–8Update security architecture diagrams, segmentation strategies, zero trust pilots, and incident response plans; define telemetry requirements and supply chain controls.
ExecutionWeeks 9–16Implement segmentation updates, deploy monitoring tools, configure secure remote access (PAM, MFA), update configuration baselines, and integrate logging with SOC.
AssuranceWeeks 17–24Conduct tabletop exercises, penetration tests, and vendor assessments; validate evidence against CSF 2.0, 800-53 overlays, and sector regulators’ expectations.
Continuous improvementOngoingEstablish quarterly reviews, update risk registers, and align capital planning for OT security upgrades.

Considerations by sector

  • Energy and utilities: Integrate DER controls, ensure inverter firmware validation, align with NERC CIP reliability standards, and coordinate with distribution management systems.
  • Manufacturing: Apply guidance to robotics, additive manufacturing, and IIoT sensors; ensure downtime planning and safety interlocks support security interventions.
  • Water and wastewater: Secure supervisory control and data acquisition (SCADA) systems, chemical dosing controllers, and remote telemetry units (RTUs); align with EPA incident reporting requirements.
  • Transportation: Address rail signaling, aviation ground systems, maritime port automation, and electric vehicle charging infrastructure with secure remote maintenance.
  • Building automation and smart cities: Harden building management systems, HVAC controls, lighting, and smart street infrastructure; plan for multi-tenant coordination.

Procurement and supply chain actions

  • Update procurement specifications to require adherence to ISA/IEC 62443 certifications, SBOM provision, vulnerability disclosure programs, and signed firmware updates.
  • Mandate secure remote access solutions for vendors, including session recording, MFA, and time-bound access approvals.
  • Establish supplier risk scoring that incorporates NIST SP 800-161r1 controls and requires evidence of secure development lifecycles.
  • Integrate contractual requirements for incident notification, patch timelines, and post-incident cooperation.

Telemetry and detection

  • Deploy passive network monitoring tools (Zeek, Nozomi, Dragos, Claroty) aligned with Revision 3 detection guidance; collect OT protocol metadata and anomalies.
  • Enable log collection from PLCs, HMIs, engineering workstations, historians, and asset management systems; normalize logs into SOC platforms.
  • Implement anomaly detection for unauthorized ladder logic changes, configuration modifications, and unexpected service creations.
  • Integrate OT telemetry with IT SIEMs, SOAR, and threat intelligence to provide unified situational awareness.

Workforce and governance

  • Update OT cybersecurity policies, roles, and responsibilities to reflect Revision 3; ensure executive sponsorship and board oversight.
  • Provide training for control engineers, operators, SOC analysts, and incident responders on new requirements, zero trust concepts, and supply chain vigilance.
  • Establish joint IT/OT governance councils to coordinate investments, risk acceptance, and compliance reporting.
  • Embed security into OT project lifecycles, including design reviews, FAT/SAT processes, and commissioning checklists.

Key metrics

  • Percentage of OT assets inventoried with accurate metadata (vendor, firmware, criticality, network segment).
  • Segmentation maturity: number of zones/conduits aligned with ISA/IEC 62443 and percentage of remote access sessions brokered through PAM.
  • Detection coverage: proportion of OT networks with passive monitoring, log collection, and anomaly detection configured.
  • Supplier assurance: percentage of strategic vendors providing SBOMs, vulnerability disclosures, and incident notification commitments.
  • Exercise cadence: frequency of IT/OT tabletop exercises, penetration tests, and red team engagements.

90-day action plan

  1. Days 1–30: Launch Revision 3 review workshops, complete gap analysis, inventory assets, and brief executives on resource needs.
  2. Days 31–60: Update architectures, segmentation, and remote access designs; start zero trust pilots and monitoring upgrades; issue procurement addenda.
  3. Days 61–90: Execute configuration changes, deploy telemetry, conduct tabletop exercises, and prepare compliance reports for regulators and boards.

This brief guides OT operators through NIST SP 800-82 Rev. 3 adoption—integrating architecture design, monitoring technology, supplier governance, and workforce enablement so critical infrastructure can operate securely and resiliently.

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Further reading

  1. NIST Special Publication 800-82 Rev. 3 — Guide to Operational Technology Security (July 9, 2024) — csrc.nist.gov
  2. NIST SP 800-82 Revision 3 final PDF — nvlpubs.nist.gov
  3. MITRE ATT&CK® for ICS matrix — attack.mitre.org
  • NIST SP 800-82 Rev. 3
  • Operational technology security
  • OT detection engineering
  • Zero Trust
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.