OT Asset Integrity Register (CISA CPG 2.1)
Get Started with This SkillOverview
Maintain and validate an OT Asset Integrity Register for CISA CPG 2.1: catalog ICS, PLCs, HMIs, and sensors with firmware versions and physical locations; link assets to CISA KEV and vendor advisories (Siemens, Rockwell, etc.); cross-reference inventory with network discovery to flag unauthorized devices. The CPGs target Critical Infrastructure; evidence means a live register and proof it is used (e.g. firmware checks, reconciliation with discovery).
Example Conversation
You: We need an OT Asset Integrity Register for our water treatment site (CPG 2.1). We have Siemens S7-1200 PLCs, Rockwell HMIs, and a few sensors. I have a network scan export too—can we check for devices that aren’t in the register?
Agent: I’ll create the register from the template and add rows for each PLC, HMI, and sensor with Vendor, Model, Firmware version, and Physical location. I’ll also need at least one network identifier (IP, hostname, or MAC) per asset so we can reconcile with your discovery export.
Agent: Running
ics_firmware_advisory_reporton the register…
Agent: The report links each asset to CISA KEV, NVD, and vendor advisories (Siemens, Rockwell). For each one, verify firmware against those sources and document findings. Now running
unmanaged_device_detectorwith your inventory and the discovery file…
Agent: Found 2 devices in discovery not in the inventory: 192.168.10.55 and plc-backup. Investigate and either add them to the register or segment/remove if unauthorized.
What the Tools Do
ics_firmware_advisory_report links the register to vulnerability checks:
- Parses the OT Asset Integrity Register (Markdown table: Asset, Type, Vendor, Model, Firmware version, Physical location, IP, Hostname, MAC)
- For each asset, outputs links to CISA Known Exploited Vulnerabilities (KEV), NVD, and vendor-specific advisory pages (Siemens, Rockwell, Schneider, ABB, etc.)
- Use when maintaining or auditing the register so every asset can be checked against known firmware vulnerabilities
unmanaged_device_detector flags potentially unauthorized devices:
- Cross-references the inventory file with a network discovery log or export (text or CSV with IPs, hostnames, or MACs)
- Lists devices that appear in discovery but not in the register
- Use after building or updating the inventory to identify devices that should be added or removed/segmented
Output Excerpt
Excerpt from a generated OT Asset Integrity Register:
| Asset | Type | Vendor | Model | Firmware version | Physical location | IP | Hostname |
|------------|------|---------|---------------|------------------|---------------------|---------------|-----------|
| PLC Zone 1 | PLC | Siemens | S7-1200 | V4.5 | Building A, Panel 1 | 192.168.10.10 | plc-zone1 |
| HMI Line 2 | HMI | Rockwell| PanelView 5500| 6.001 | Building B, Line 2 | 192.168.10.20 | hmi-l2 |
- Include Firmware version and Physical location for CPG 2.1 evidence; use
ics_firmware_advisory_reportto drive CISA KEV and vendor advisory checks. - Include at least one of IP, Hostname, or MAC so
unmanaged_device_detectorcan reconcile with network discovery.
Getting Started
Add your source materials (e.g. existing OT asset lists, network discovery export) to the project workspace, then activate the OT Asset Integrity Register (CISA CPG 2.1) skill. The agent will guide you through building the register, running the firmware advisory report, and reconciling with discovery to flag unmanaged devices.