The OWASP Operational Technology Top 10
This is the preliminary list of the OWASP Operational Technology Top 10. The list is a work in progress and will be updated as we gather more information and feedback from the community.
During the discussions, we agreed upon the items of the top 10 list while the respective ranking was highly subjective. The selected the Top 3 items as there was consensus that these are fundamental for OT security:
- Unknown Assets and Unmanaged External Access
- Devices with known Vulnerabilities/Issues
- Inadequate Supplier/Supply Chain Management
The next six items were all deemed to be of similar high importance:
- Insufficient Access Control
- Missing Incident Detection/Reaction Capabilities
- Broken Zones and Conduits Design
- Missing Awareness
- Components/Protocols with Insufficient Security Capabilities
- Availability
The final item is not a security issue by itself but would have prevented many of the incidents reported from the field. We thus included it as final item in the Top 10 list:
Structure of each Top 10 Item
Each entry in the OWASP OT Top 10 will be accompanied by a short description, public incidents exploiting that entry, recommended mitigation and countermeasures, as well as references and tooling to assist in addressing the identified risks.
Field | Description |
---|---|
Name | Name/Title of the Item |
Description | Show description of the item |
Rationale | Why did we find this item important enough for inclusion? |
Known Attacks/Examples | What are documented attacks that utilized the respective Top 10 item? |
Mitigation/Countermeasures | There will be multiple levels: 1) design and implementation level mitigations for developers/builders; 2) operational mitigations for integrators, e.g., air-gapping systems |
Next Actionable Steps | What can be done to identify and/or mitigate the issue? |
References | Relevant standards, Links to Tools, and Background Information |
Methodology
The project started Autumn 2024 with a meeting of the OWASP OT Top 10 leaders and subsequent announcements to the community. During monthly meetings we discussed potential Top 10 items and their relevance. Starting with 2025, we increased the frequency to one meeting every two weeks to finalize the alpha version.
In addition to the expert opinions, we also gathered empirical data from both offensive and defensive companies and experts. This data was used to validate the proposed top 10 list and ensure that it accurately reflects the current state of OT security.