{"id":2300,"date":"2025-08-15T13:55:24","date_gmt":"2025-08-15T13:55:24","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2025\/08\/15\/us-and-five-global-partners-release-first-unified-ot-security-taxonomy\/"},"modified":"2025-08-15T13:55:24","modified_gmt":"2025-08-15T13:55:24","slug":"us-and-five-global-partners-release-first-unified-ot-security-taxonomy","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2025\/08\/15\/us-and-five-global-partners-release-first-unified-ot-security-taxonomy\/","title":{"rendered":"US and Five Global Partners Release First Unified OT Security Taxonomy"},"content":{"rendered":"<div id=\"cphContent_pnlMainContent\">\n<h2>Written by<\/h2>\n<div>\n<p><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/a7d280e2-8cd7-47a1-ba33-0ae2a304849f.png?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Kevin  Poireault\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-435c8220-d699-4c13-bfbb-fae0e063adda\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>The US has partnered with three other Five Eyes countries (Australia, Canada and New Zealand) as well as Germany and the Netherlands to develop a common asset inventory and taxonomy guide for operational technology (OT) and industrial control systems (ICS).<\/p>\n<p>The document, <em>Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators<\/em>, was published on August 13 by nine government agencies, including four from the US.<\/p>\n<p>At the core of the guidance is an organized list of systems, hardware and software that are part of \u2013 or are connected to \u2013 industrial information networks.<\/p>\n<p>The document also provides additional asset taxonomies for some specific industrial sectors, such as oil and gas, electricity and water and wastewater.<\/p>\n<p><em>Read more: Over Half of Organizations Report Serious OT Security Incidents<\/em><\/p>\n<p>The document also outlines a process for OT owners and operators to create and maintain an asset inventory. This process involves defining the scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data and implementing asset life cycle management.<\/p>\n<p>\u201cThis guidance outlines how OT owners and operators can maintain, improve and use their asset inventory to protect their most vital assets. Steps include OT cybersecurity and risk management, maintenance and reliability, performance monitoring and reporting, training and awareness and continuous improvement,\u201d the document reads.<\/p>\n<\/p><\/div>\n<figure id=\"layout-f8d51cdd-f88f-4d92-b9ff-5fdfe891d101\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/localimages\/66a99c6c-aee9-43c5-9ef5-7aa0fc21875e.png\" alt=\"Steps to develop an OT asset inventory and taxonomy. Source: US Cybersecurity and Infrastructure Security Agency (CISA)\"><figcaption>Steps to develop an OT asset inventory and taxonomy. Source: US Cybersecurity and Infrastructure Security Agency (CISA)<\/figcaption><\/figure>\n<div id=\"layout-49c1072c-2d05-4882-8af8-f538588a9014\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<p>The aim is to help critical infrastructure operators understand their ecosystem and enhance the cybersecurity and protection of critical assets.<\/p>\n<p>This document is meant to be updated regularly to keep pace with technological advances and adoption developments.<\/p>\n<p>\u201cThis guide emphasizes the importance of proactive planning, collaboration between IT and OT teams and, where possible and appropriate, the integration of cutting-edge technologies to stay ahead of potential threats,\u201d the document concludes.<\/p>\n<p>The authoring agencies include the NSA, the FBI, the US Cybersecurity and Infrastructure Security Agency (CISA), the US Environmental Protection Agency (EPA), the Australian Signals Directorate\u2019s Australian Cyber Security Centre (ASD\u2019s ACSC), the Canadian Centre for Cyber Security (Cyber Centre), Germany\u2019s Federal Office for Information Security (BSI), the Netherlands\u2019 National Cyber Security Centre (NCSC-NL) and New Zealand\u2019s National Cyber Security Centre (NCSC-NZ).<\/p>\n<p><em>Read now: US Federal Agencies Alert on \u201cUnsophisticated\u201d OT Cyber-Threats<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Written by The US has partnered with three other Five Eyes countries (Australia, Canada and New Zealand) as well as Germany and the Netherlands to develop a common asset inventory and taxonomy guide for operational technology (OT) and industrial control systems (ICS). The document, Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators<\/p>\n","protected":false},"author":2,"featured_media":2301,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2300-2e0d775d-d566-4003-9050-13fe2798488b-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2300"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2301"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}