NISTIR 8183A Vol. 2

Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 2 – Process-based Manufacturing System Use Case

Date Published: September 2019


Keith Stouffer (NIST), Timothy Zimmerman (NIST), CheeYee Tang (NIST), Michael Pease (NIST), Jeffrey Cichonski (NIST), Neeraj Shah (Strativia), Wesley Downard (G2)



computer security; Cybersecurity Framework (CSF); distributed control systems (DCS); industrial control systems (ICS); information security; manufacturing; network security; programmable logic controllers (PLC); risk management; security controls; supervisory control and data acquisition (SCADA) systems
Control Families

Access Control; Audit and Accountability; Awareness and Training; Configuration Management; Contingency Planning; Identification and Authentication; Incident Response; Maintenance; Media Protection; Personnel Security; Physical and Environmental Protection; Planning; Program Management; Risk Assessment; Assessment, Authorization and Monitoring; System and Communications Protection; System and Information Integrity; System and Services Acquisition


NISTIR 8183A Vol. 2 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
NISTIR 8183A Vol. 1
NISTIR 8183A Vol. 3

Related NIST Publications:

Document History:
05/28/19: NISTIR 8183A Vol. 2 (Draft)
09/30/19: NISTIR 8183A Vol. 2 (Final)