OT Asset Inventory Made Practical: What the New NSA/CISA Guidance Means — and How to Get There - RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Capabilities
      • Hybrid Environment Modeling
      • Attack Path Analysis
        addyi
      • Risk Prioritization
      • Continuous Compliance
    • Integrations
    • CTEM
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
  • Solutions
    • Business Use Cases
      • Breach Impact Reduction
      • Mergers & Acquisitions
      • Cyber Insurance Optimization
    • Industries
    • CTEM
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

OT Asset Inventory Made Practical: What the New NSA/CISA Guidance Means — and How to Get There

2025-08-20
/  byWayne Lloyd, Federal CTO, RedSeal
Bottom line: NSA, CISA, EPA, FBI, and allied cyber agencies just published prescriptive guidance for building and maintaining an OT asset inventory and taxonomy—the foundation for a modern, defensible OT architecture. If you already run RedSeal, you can fulfill most of the guidance quickly by modeling your hybrid networks, auto-grouping assets into OT zones, validating segmentation, and continuously monitoring drift. If you don’t have RedSeal, you can still make rapid progress with a pragmatic, manual-first playbook and a tight operating cadence.
What’s new and why it matters
On August 13, 2025, CISA—joined by NSA, EPA, FBI, and peer agencies from Australia, Canada, Germany, the Netherlands, and New Zealand—released Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators. The goal: give OT owners/operators a systematic way to build an asset inventory plus a supplemental taxonomy that clarifies criticality, function, and dependencies so you can prioritize defenses and keep operations safe. CISA
NSA’s companion press note underscores the risk frame: OT systems are prime targets for disruption and extortion; the new process is meant to drive a modern defensible architecture by turning inventory and taxonomy into daily-operational tools for risk ID, vuln management, and incident response. NSA
What the guidance actually asks you to do
The document lays out a practical, repeatable sequence you can implement sector-by-sector or site-by-site:
  1. Define scope & objectives and establish governance for asset management.
  2. Identify assets across systems, hardware, and software (expect legacy protocols and walkdowns in plants).
  3. Collect attributes that matter for OT (function, location, firmware, network addressing, vendor, safety impact, etc.).
  4. Create an OT taxonomy that groups assets by function and criticality to support prioritization and reporting.
  5. Manage the data: normalize, de-duplicate, and choose a system of record.
  6. Implement lifecycle management so the inventory stays accurate as things change.
  7. Post-inventory actions: use the inventory for risk management, maintenance, KPIs/metrics, training, and continuous improvement.
  8. Sector examples (oil & gas, electricity, water/wastewater) are included as conceptual taxonomies to copy/adapt—not mandates.
How RedSeal helps you meet (and keep) the guidance
Translate the guidance into workflows you can run:
  • Asset discovery via configuration modeling (not intrusive scanning). RedSeal ingests device configs (routers, switches, firewalls, cloud constructs) to build a live model of reachable networks, subnets, and routes—including “dark” or unscanned subnets you didn’t know to ask for. That accelerates the “identify assets + collect attributes” steps without touching fragile OT endpoints.
  • Taxonomy & zoning you can defend. Use RedSeal to define OT zones (Level 0–3/3.5/DMZ), plants, safety systems, remote access enclaves, and vendor gateways; tag assets and subnets accordingly; and validate that traffic paths actually enforce those zones. This operationalizes the taxonomy requirement into policy you can measure.
  • Segmentation & path analysis. Instantly check which external sources (or IT enclaves) can reach specific PLC networks and over which ports/protocols; flag rules and devices enabling that access; and document required paths (e.g., historian to DMZ to IT) vs. prohibited paths. That directly supports the guide’s “use the inventory for risk management and incident response.”
  • Secure configuration baselines—maintained for you. RedSeal ships and maintains secure-config checks, so you’re not hand-authoring rules for every platform—closing the gap the guide calls out on governance and lifecycle.
  • Prioritization with context (Risk Radius). Combine model-based reachability with vuln data to focus on exploitable exposures that matter to operations and safety; quantify blast radius if a device is compromised to drive maintenance windows and remediation.
  • Continuous assurance. Schedule config pulls and policy checks to keep the inventory current and produce monthly KPIs (coverage, drift, # of prohibited paths removed, % of assets with required attributes, etc.) to satisfy the guidance’s “performance monitoring and reporting.”
Outcome: With RedSeal, most of the guidance becomes configuration-driven and repeatable, no fragile probes into Level 0/1, fewer site walkdowns, faster time to a defendable taxonomy, and continuous evidence for regulators, boards, and plant leadership.
Don’t have RedSeal? A pragmatic playbook you can start today
You can still execute the guidance with a manual-first approach and low risk to operations:
  1. Scope & governance (Week 0–1)
    • Name a single inventory owner; define change-control hooks.
    • Pick a system of record: a spreadsheet today; migrate to CMDB later.
    • Adopt a simple taxonomy starter: Site → Zone (L0–L3.5/DMZ) → Function (Safety, Control, Historians, Engineering Workstations) → Criticality (High/Med/Low).
  2. Collect the first 80% (Weeks 1–4) — no intrusive scanning
    • Export firewall rulebases and NATs; pull router/switch route tables, ARP, MAC, CDP/LLDP neighbors; harvest VLAN–subnet maps; gather DHCP scopes.
    • Pull vendor asset lists from maintenance systems and spare-parts logs.
    • Walk the floor once for safety-critical panels and “stranded” devices, using photos + serials.
    • Normalize names; assign each asset to Site/Zone/Function/Criticality; record minimum attributes (model, firmware, IP/subnet, last-seen source).
  3. Make it useful (Weeks 4–6)
    • From firewall exports, generate your first “Allow List to OT”: all sources, ports, protocols allowed into OT; which rules/devices enable them; and which OT zones they terminate in. Use it to remove obvious over-permissive rules.
    • Produce top 10 prohibited paths discovered (e.g., IT laptops → L2 networks).
    • Stand up monthly KPIs: % assets with required attributes; # of unknown subnets; # of over-permissive rules removed; % of OT zones with validated inter-zone policy.
  4. Sustain & improve (Months 2–6)
    • Establish a cadence: weekly delta-captures from firewalls/routers/switches; monthly plant review; quarterly taxonomy tune-up.
    • Map inventory to incident response playbooks (what to isolate, and how) and to maintenance windows.
    • Align with NIST SP 800-82 and CISA CPGs to show maturity progress to auditors and execs.
Tip: If you later adopt RedSeal, you can ingest the same config sources to automate the steps you were doing by hand—turning your spreadsheet into a live model with policy validation and continuous drift detection.
Example deliverables your board and plant managers will understand
  • One-page OT Taxonomy for your organization (zones, functions, criticality definitions, naming standards).
  • OT Allow-Into Report: “All IPs allowed into OT, by port/protocol, rule, device, and destination zone,” with owner and remediation recommendation.
  • Segmentation Scorecard: % of required inter-zone policies enforced; # of prohibited paths eliminated this month.
  • Risk & Maintenance Heatmap: assets by criticality × firmware currency × reachable-from-IT.
Where to start this week
  1. Adopt the official steps. Use the new guide to define scope, attributes, and your taxonomy; copy a sector example if it fits your environment. CISA
  2. Pick a discovery approach. RedSeal for model-based automation and continuous assurance; or a manual, low-impact sweep using configs and plant walkdowns.
  3. Publish the first “Allow-Into OT” list and remove one risky rule this week.
  4. Set KPIs and a 30/60/90 plan so progress is visible.
Sources
  • CISA: Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators (published Aug. 13, 2025), including partner list and purpose. CISA
  • Guidance PDF: steps for inventory, taxonomy, sector examples, and post-inventory actions. CISA
  • NSA press release: context on threats and emphasis on defensible architecture/use of inventory. NSA
  • NIST SP 800-82r3: broader OT security control practices. NIST Publications
  • CISA Cybersecurity Performance Goals (CPGs): implementation and tracking framework. CISA

Share this entry

Recent Posts

  • When OT Is Targeted, “Best Practices” Aren’t Enough

    2026-03-03
  • Stop Chasing Every Alert: An Analyst’s Perspective on What Smarter Exposure Management Looks Like in 2026

    2026-02-19
  • RedSeal at AFCEA West 2026: What We Heard, and Why It Matters

    2026-02-16
  • Platform Consolidation Is Reshaping Cybersecurity — But Exposure Management Still Requires Depth

    2026-01-08
  • From Reactive to Resilient: How 2025’s Cybersecurity Evolution Redefines Defense for 2026

    2026-01-05

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Capabilities
  • Integrations
  • CTEM

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University

Solutions

  • Business Use Cases
  • Industries
  • CTEM

Partners

  • RedSeal Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Events
  • Resource Center
CONTACT US
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Link to: RedSeal Launches Risk Radius™ to Help Security Teams Focus on What Matters Most Link to: RedSeal Launches Risk Radius™ to Help Security Teams Focus on What Matters Most RedSeal Launches Risk Radius™ to Help Security Teams Focus on What Matters... Link to: RedSeal Wins Two Top Honors at the 2025 UXcellence Awards Link to: RedSeal Wins Two Top Honors at the 2025 UXcellence Awards RedSeal Wins Two Top Honors at the 2025 UXcellence Awards
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn