Solicitar documento

Puede adquirir el documento solicitándolo a o registrándose como miembro con acceso a entregables.

Document request

If you are interested in this document, you can ask for it at or register freely in our platform as a member able to access to deliveries.

Best Practices for Cybersecurity Diagnosis in Industrial Environments


The main objectives of the industrial cybersecurity diagnosis is to assess the cybersecurity of industrial plants identifying the vulnerabilities and risks they are facing. It proposes as well actions to overcome such risks.

In addition, if you want to acquire the necessary knowledge to apply a cybersecurity diagnosis in an industrial environment, we encourage you to sign up for the practical workshop that CCI organizes: T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment. Workshop based on this document (which will be delivered at no additional cost as workshop documentation), during which the following topics will be addressed:

  • Industrial automation technologies and risk scenarios
  • Industrial use case
  • Diagnostic characteristics
  • Methodology and interviews
  • Network Architecture Diagnosis
  • Systems Diagnosis
  • Physical security diagnosis
  • Third party diagnosis
  • The diagnosis report and its presentation

For further information about this Workshop, please visit:

If you prefer a more complete training in which to put this document into practice together with other publications of relevant interest, we encourage you to enroll in the practical course that CCI organizes: C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control Systems).
More information about this Course at:


You can purchase this document by mail at


Pocket Guide: Reducing risks incurred by OT cybersecurity controls


Pocket guide, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.