NIST SP 800-82 Rev 3 (2023) is the definitive guide to Industrial Control System (ICS) security — covering SCADA, DCS, PLC, RTU, and HMI security practices aligned to NIST SP 800-53 controls. Skyhigh maps every OT/ICS tabletop exercise to SP 800-82 security control families — generating audit-ready evidence for CISA, DOE, and sector cybersecurity assessments.
⚠️ NIST SP 800-82 Rev 3 is guidance, not a mandatory regulation — unless referenced by a specific regulatory framework (e.g., NERC CIP, TSA directives). This toolkit is for exercise program design. Consult your sector regulator for mandatory requirements.
| SP 800-82 / SP 800-53 Control Area | ICS-Specific Requirement | Skyhigh Coverage | Evidence Generated |
|---|---|---|---|
| IR Family — Incident Response (IR-1 to IR-10) | IR-3: Incident response testing required. IR-6: Incident reporting. IR-8: ICS incident response plan | Core | Exercise = IR-3 testing compliance; AAR = IR-6/IR-8 documentation |
| AT Family — Awareness & Training (AT-2, AT-3) | OT-specific security awareness; role-based ICS security training for operators/engineers | Core | Each exercise = AT-2/AT-3 training event evidence for ICS personnel |
| CA Family — Security Assessment (CA-2, CA-7, CA-8) | ICS security control assessment; continuous monitoring; penetration testing (OT-adapted) | Direct | Exercise gap analysis = CA-2 assessment evidence; finding remediation = CA-8 |
| SI Family — System & Info Integrity (SI-3, SI-4, SI-7) | OT malware protection (OT-adapted); ICS monitoring; software/firmware integrity | Direct | Detection exercise results; OT monitoring coverage gaps surface in scenarios |
| SC Family — System & Comms (SC-7, SC-39) | OT network segmentation (DMZ, zones); boundary protection; remote access security | Direct | IT/OT lateral movement scenarios test segmentation; DMZ architecture gaps |
| AC Family — Access Control (AC-2, AC-17) | ICS user account management; remote access controls; vendor/third-party access | Direct | Remote access abuse scenarios; vendor credential compromise; access review gaps |
| CM Family — Configuration Mgmt (CM-2, CM-6, CM-7) | ICS baseline configuration; OT configuration settings; least functionality | Supporting | Configuration gap findings from scenarios (default creds, unnecessary services) |
| SA Family — System Acquisition (SA-12) | ICS supply chain risk management; OEM/vendor software integrity | Direct | Supply chain attack scenarios; OEM vendor compromise; firmware integrity exercises |
Skyhigh exercise evidence maps to multiple frameworks simultaneously. One exercise program — complete regulatory coverage.
SP 800-82 Rev 3 IR-3 requires documented ICS incident response testing. Skyhigh is purpose-built for OT/ICS. Free to start.