nist 800-82 assessment tool

NIST 800-82 Assessment Tool

Looking for a NIST 800-82 assessment tool to make your cybersecurity assessments easier and faster? Make sure to download the white paper at the bottom to get the most value from your assessment process.


What is NIST 800-82?

In 2006, the National Institute of Standards and Technology (NIST) released a cybersecurity guide specifically to secure Industrial Control Systems (ICS). This special publication, known as NIST 800-82, provides a framework around several ICS, including:

  • Supervisory Control and Data Acquisition (SCADA) systems
  • Distributed Control Systems (DCS)
  • Programmable Logic Controllers (PLC), among other control systems configurations


Why Use the NIST 800-82 Framework?

In 2015, NIST 800-82 was revised to offer more guidance regarding the application of modern IT cybersecurity practices to the world of traditionally walled-off ICS hardware that has increasingly been moving online. This revision aimed to reduce the vectors of attack from bad actors looking to compromise our nation’s critical infrastructure, including utilities, chemical companies, and food manufacturers.

The NIST 800-82 document has seen over three million downloads since its release in 2006 and provides detailed information around:

  • the evolution of ICS from isolated to connected technology
  • the understanding of how to assess the risks of ICS increasingly being connected to the Internet
  • the development and deployment of an ICS security program across an organization in the critical infrastructure sector
  • ICS security architecture, including firewalls, network segregation, redundancy and fault tolerance, monitoring, logging and auditing
  • the application of security controls to ICS


How to Conduct a NIST 800-82 Assessment

While many organizations may understand the importance of securing their ICS, they lack an accessible NIST 800-82 assessment tool that can help them quickly ascertain their risk posture, understand correct mitigation strategies and monitor progress over time. These organizations often turn to ICS cybersecurity consultants to help them ensure that they are adhering to the NIST 800-82 guidelines to better secure their facilities.

Although cybersecurity consultants have a wealth of knowledge and are vital in securing ICS across our country, we at have noticed one thing hamstringing their efforts: these consultants are often trapped in “spreadsheet hell” as they try to assess an organization’s current status. While the assessment is critical to helping the consultant process security-related data, this often lengthy process delays the consultant’s valuable role in implementing security controls and remediating threat vectors. That is why the platform is the perfect NIST 800-82 assessment tool for ICS cybersecurity consultants who need to rapidly assess an organization’s risk posture.


Escape Spreadsheet Hell with allows consultants and internal cybersecurity teams to trade spreadsheets for a cloud-based platform that comes prepopulated with assessment workflows tailor-made with our NIST 800-82 assessment tool. The time required to perform an assessment is reduced dramatically, from weeks or months to a matter of days. And if a team is working across multiple locations and facilities, the platform ensures consistency across the assessment, providing instantaneous insights through its dashboards.


Ready to Get Started?

If you are an ICS cybersecurity professional looking for a NIST 800-82 assessment tool to empower you to perform standardized assessments to secure your critical infrastructure faster, see how can help in this 3-minute demo, or contact our team.

Read and download this white paper to gain more value from your cybersecurity assessments.

Gaining More Value From Assessments

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on email

Recent Articles


Two-Factor Authentication

What is Two-Factor Authentication? Two-Factor Authentication (2FA) is a security process in which a user provides two different authentication factors to verify themselves when logging

Read More »

Contact Us