Solicitar documento

Para descargar este documento debe ser miembro con acceso a entregables. Si ya es miembro, puede descargarlo desde nuestra plataforma NGLibrary.

Document request

If you are interested in this document, you can ask for it at info@cci-es.org or register freely in our platform as a member able to access to deliveries.

Pocket Guide: Reducing risks incurred by OT cybersecurity controls

It is crucial that each cybersecurity control or measure that we implement includes a constant re-evaluation of the associated risks since security is a dynamic and constantly evolving process, which requires us to be ready to adjust and continually improve our strategies.

CCI has made this pocket guide available, which addresses the most common risks linked to the seven main cybersecurity measures in automation and industrial control environments. This analysis will allow an understanding of the potential threats to which we are exposed and, in turn, will facilitate the implementation of effective strategies to protect critical systems in these operating environments.

The 7 main cybersecurity measures that we will address in this guide are:

1 – Network Segmentation

2– Access controls and authentication

3– Updates and patches

4– Data backup and restoration

5– Monitoring and recording of events

6– Protection against malware

7– Incident response

Available free of charge to active members and active members with subscription from the Knowledge Platform.

You can purchase this document on our NGLibrary
18/09/2023

Title

The Hammurabi Project at Grupo Central Lechera Asturiana

05/05/2026

This document analyzes the success story of Project Hammurabi at Grupo Central Lechera Asturiana, using the NIS2 Directive as a driver to transform its industrial cybersecurity into a model of strategic maturity and governance. Through a structure that emulates the historical legal code, the author José Luis Vega Pardo details the transition from a system of scattered controls to a robust Master Plan that integrates IT and OT environments. […]

The role of digital twins in the evolution of cybersecurity: benefits, challenges, and experiences

22/04/2026

This document analyzes the role of digital twins as a strategic tool to strengthen cybersecurity in industrial environments. Through a technical analysis and a manufacturing use case, the text examines their benefits, implementation challenges, and capabilities for threat simulation. It provides key recommendations for integrating these virtual replicas as essential assets for the operational resilience […]

Study of High-Impact OT Incidents in the Railway Sector

15/04/2026

This document analyzes OT cybersecurity risks in the railway sector, considered an essential infrastructure. Through expert assessment, it models two key attacks: traffic management intrusion and “trackside” system manipulation. The report details the phases of these incidents, from initial access to systemic impact on operations. Finally, it proposes strategic solutions under the IEC 62443 standard […]

Industrial CRA Position Paper (Multisectoral)

24/11/2025

The new Industrial CRA Position Paper from the Industrial Cybersecurity Center highlights a critical need: adapting the European Cyber Resilience Regulation to the reality of OT environments. Critical infrastructures, legacy systems, decades-long life cycles, and the absolute priority of availability make it impossible to apply the CRA as currently designed. The document proposes a multisectoral […]