Back to Resources
Field Note September 2025 7 min read

NIST SP 800-82 Revision 3: What Changed and Why It Matters

NIST's guidance on industrial control system security was updated. We break down key changes and what they mean for your security program.

C

Cascadia OT Security

OT & ICS Security

LEVEL 5Corporate / ERPLEVEL 4Business SystemsLEVEL 3.5Industrial DMZLEVEL 3Operations · MES · HistorianLEVEL 2SCADA · HMILEVEL 1PLC · RTU · ControllersLEVEL 0Process · Sensors · ActuatorsPURDUE MODELDMZ = CONTROL PLANE

NIST SP 800-82, the authoritative guidance on securing industrial control systems, was revised significantly. If your security program is still based on Revision 2, you're using a framework that predates modern threats and doesn't reflect current best practices. Revision 3 emphasizes supply chain security, resilience, zero trust principles in OT, and the integration of IT and OT security—changes that should reshape how many industrial organizations approach cybersecurity.

For many organizations, NIST 800-82 is the foundation of their cybersecurity program. It's referenced in contracts, in regulatory expectations, and in audit procedures. Understanding what changed in Revision 3 is essential if you're updating your security program, training your team, or preparing for external assessment.

Key Changes in Revision 3

Revision 3 places greater emphasis on supply chain security and third-party risk. Industrial control systems depend on vendors—integrators, software providers, device manufacturers. The supply chain is a key attack vector. Revision 3 recommends formal vendor security assessment, contractual security requirements, and ongoing vendor monitoring. This is more rigorous than Revision 2's recommendations and reflects the reality of modern supply chain attacks.

Revision 3 also incorporates zero trust principles into OT guidance. Zero trust in OT doesn't mean removing all trust from your internal network—that's impractical. Instead, it means authenticating and authorizing every access request, every connection, every data exchange, even within your operational network. This requires visibility, strong identity management, and continuous monitoring. The practical implication: assume compromise and build defenses accordingly.

Major Framework Changes

Practical Implications for Industrial Operators

If you haven't updated your security program since Revision 2, start by conducting a gap assessment. Where does your current program align with Revision 3 expectations, and where are the gaps? Prioritize supply chain security assessment if you haven't done it. Evaluate your vendor relationships and assess their security practices. Build or strengthen your continuous monitoring capability. Ensure your board and leadership understand cybersecurity risk and your mitigation strategy.

NIST 800-82 Revision 3 is comprehensive and well-developed guidance. If you follow it, you'll build a security program that protects against modern threats and aligns with industry expectations. We help industrial organizations interpret NIST guidance, assess alignment, and build programs that meet Revision 3 standards. Let's discuss NIST 800-82 alignment for your organization.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call