Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

Cybersecurity in the Life Cycle of an Industrial Automation Project

978-84-945412-0-9

This document presents the most effective activities to protect the digital technologies used in the operation of an industrial plant, from the earliest stages of their life cycle – design, supply and installation / commissioning -, incorporatin, in each of them, the appropriate cybersecurity measures and mechanisms, along with the rest of the functionality, quality and security requirements linked to operations.

You can purchase this document on our NGLibrary
ES
27/04/2016
350€

Title

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]

Pocket Guide – Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities

22/10/2025

This document, titled “Pocket Guide: Questions to Ask Your Industrial Technology and Service Providers About Their Cybersecurity Capabilities,” developed by the Industrial Cybersecurity Center (CCI), provides a structured set of questions designed to help organizations assess the level of maturity and commitment to cybersecurity among their industrial suppliers.

10 Best IT Security Practices Adapted to the OT Environment

18/03/2025

This pocket guide will help you enhance security in industrial environments (OT) without compromising system stability or availability. By adapting IT best practices, it provides strategies for access control, network segmentation, data encryption, and secure device management, minimizing risks while ensuring operational continuity.