U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations for Process-based Manufacturing System Datasets

The Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide provides example proof-of-concept solutions demonstrating how open-source and commercial off-the-shelf (COTS) products that are currently available today can be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile [8] Low Security Level. Example proof-of-concept solutions for a process-based manufacturing environment and a discrete-based manufacturing environment are included in the guide. Depending on factors like size, sophistication, risk tolerance, and threat landscape, manufacturers should make their own determinations about the breadth of the proof-of-concept solutions they may voluntarily implement. The dataset records the Key Performance Indicator (KPI) for the example implementation of the process-based manufacturing system use case.

About this Dataset

Updated: 2024-02-22
Metadata Last Updated: 2019-05-17 00:00:00
Date Created: N/A
Views:
Data Provided by:
cybersecurity
Dataset Owner: N/A

Access this data

Contact dataset owner Access URL
Landing Page URL
Table representation of structured data
Title Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations for Process-based Manufacturing System Datasets
Description The Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide provides example proof-of-concept solutions demonstrating how open-source and commercial off-the-shelf (COTS) products that are currently available today can be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile [8] Low Security Level. Example proof-of-concept solutions for a process-based manufacturing environment and a discrete-based manufacturing environment are included in the guide. Depending on factors like size, sophistication, risk tolerance, and threat landscape, manufacturers should make their own determinations about the breadth of the proof-of-concept solutions they may voluntarily implement. The dataset records the Key Performance Indicator (KPI) for the example implementation of the process-based manufacturing system use case.
Modified 2019-05-17 00:00:00
Publisher Name National Institute of Standards and Technology
Contact mailto:[email protected]
Keywords cybersecurity , smart manufacturing , industrial control system , process control system
{
    "identifier": "891A0F41384D739AE05324570681A6422071",
    "accessLevel": "public",
    "references": [
        "https:\/\/doi.org\/10.6028\/NIST.IR.8183A-2-draft"
    ],
    "contactPoint": {
        "hasEmail": "mailto:[email protected]",
        "fn": "CheeYee Tang"
    },
    "programCode": [
        "006:045"
    ],
    "@type": "dcat:Dataset",
    "landingPage": "https:\/\/data.nist.gov\/od\/id\/891A0F41384D739AE05324570681A6422071",
    "description": "The Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide provides example proof-of-concept solutions demonstrating how open-source and commercial off-the-shelf (COTS) products that are currently available today can be implemented in manufacturing environments to satisfy the requirements in the Cybersecurity Framework (CSF) Manufacturing Profile [8] Low Security Level. Example proof-of-concept solutions for a process-based manufacturing environment and a discrete-based manufacturing environment are included in the guide. Depending on factors like size, sophistication, risk tolerance, and threat landscape, manufacturers should make their own determinations about the breadth of the proof-of-concept solutions they may voluntarily implement. The dataset records the Key Performance Indicator (KPI) for the example implementation of the process-based manufacturing system use case.",
    "language": [
        "en"
    ],
    "title": "Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations for Process-based Manufacturing System Datasets",
    "distribution": [
        {
            "accessURL": "https:\/\/doi.org\/10.18434\/M32071",
            "title": "DOI Access for Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations for Process-based Manufacturing System Datasets"
        }
    ],
    "license": "https:\/\/www.nist.gov\/open\/license",
    "bureauCode": [
        "006:55"
    ],
    "modified": "2019-05-17 00:00:00",
    "publisher": {
        "@type": "org:Organization",
        "name": "National Institute of Standards and Technology"
    },
    "accrualPeriodicity": "irregular",
    "theme": [
        "Information Technology:Cybersecurity",
        "Manufacturing:Manufacturing systems design and analysis",
        "Manufacturing:Process measurement and control"
    ],
    "keyword": [
        "cybersecurity",
        "smart manufacturing",
        "industrial control system",
        "process control system"
    ]
}

Was this page helpful?