Critical Infrastructure Overlay. Sector-Specific Security Forged for Resilience.

Critical Infrastructure Sector Overlay

NIST CSF sector profiles for the 16 critical infrastructure sectors defined by CISA. Energy, water, transportation, communications, and IT sector profiles composed as overlays on NIST 800-53. OT/ICS security considerations for environments where availability takes precedence over confidentiality. Continuous evidence collection from connected infrastructure with sector-specific control modifications.

Sector-specific security requirements. Forged from the infrastructure that societies depend on.

Critical infrastructure sectors face threats that carry consequences beyond data loss. Power grids, water treatment facilities, transportation networks, and communications systems underpin daily life. NIST CSF sector profiles translate these operational realities into concrete security modifications that extend a base NIST 800-53 assessment. Redoubt Forge composes sector profiles as overlays, stacking sector-specific requirements onto your existing framework assessment with proper precedence and conflict resolution.

01
CI Overlay
NIST CSF Sector Profiles for the 16 Critical Infrastructure Sectors Defined by CISA.

Presidential Policy Directive 21 (PPD-21) identifies 16 critical infrastructure sectors whose assets, systems, and networks are considered so vital that their incapacitation or destruction would have a debilitating effect on national security, economic stability, public health, or safety. These sectors span energy, water and wastewater systems, transportation, communications, information technology, financial services, healthcare, food and agriculture, government facilities, emergency services, defense industrial base, chemical, commercial facilities, dams, nuclear reactors, and critical manufacturing. Each sector operates under distinct regulatory frameworks, threat models, and operational constraints. The Cybersecurity and Infrastructure Security Agency (CISA) coordinates cross-sector risk management and publishes sector-specific guidance that maps security requirements to the operational realities of each domain. NIST CSF 2.0 introduced sector profiles as a mechanism for tailoring the Cybersecurity Framework to the specific risk landscape of each critical infrastructure sector.

A sector profile is not a separate framework. It is a structured set of modifications, additions, and prioritization guidance that adapts the NIST CSF core functions (Govern, Identify, Protect, Detect, Respond, Recover) to the threat environment and operational priorities of a specific sector. The energy sector profile, for example, elevates availability and recovery requirements because power generation and distribution systems cannot tolerate extended outages. The communications sector profile emphasizes redundancy and resilience because telecommunications infrastructure serves as the backbone for all other sectors. Each profile references specific NIST 800-53 controls that require modification or additional implementation guidance when applied to that sector's operational technology and information technology environments. The profiles also identify sector-specific threat categories, consequence thresholds, and risk tolerance levels that inform how organizations within that sector should prioritize their security investments.

OT/ICS environments introduce security considerations that differ fundamentally from conventional enterprise IT. Operational Technology controls physical processes: opening valves, adjusting temperatures, managing electrical loads, coordinating rail switching. The consequences of a security failure in these environments are measured in physical harm, environmental damage, and loss of human life, not just data compromise. NIST SP 800-82 (Guide to Operational Technology Security) provides the foundational guidance for securing these systems, and the critical infrastructure overlay incorporates 800-82 requirements alongside CSF sector profiles. Redoubt Forge implements this layered approach through overlay composition: the base NIST 800-53 assessment provides the control catalog, the CSF sector profile adds sector-specific modifications, and 800-82 guidance adds OT/ICS-specific requirements. The result is a unified assessment that reflects the full security obligation for organizations operating in critical infrastructure sectors.

02
Overlay Mechanics
CSF Sector Profiles Compose onto Base Frameworks. MODIFY and ADD Operations for Sector Requirements.

CSF sector profiles operate as overlays on a base framework assessment, following the composition model defined in NIST SP 800-53B. Each sector profile performs two primary operations. MODIFY operations refine existing NIST 800-53 controls with sector-specific implementation guidance and parameter values. Where the base 800-53 control CP-2 (Contingency Planning) requires organizations to develop a contingency plan, the energy sector profile modifies that control to require contingency planning that accounts for cascading failures across interconnected generation and distribution systems, with recovery time objectives measured in minutes rather than hours. ADD operations introduce new requirements that do not exist in the base catalog. The water sector profile adds requirements for monitoring chemical treatment processes and maintaining safety interlocks that prevent contamination events during cyber incidents. These operations are deterministic: each modification traces to a specific CSF subcategory, a specific 800-53 control, and a specific sector justification.

The overlay composition engine in Rampart stacks sector profiles onto your base framework assessment alongside any other active overlays. An energy company running NIST 800-53 Moderate as its base framework can activate the energy sector CSF profile, the NERC CIP overlay for bulk electric system requirements, and NIST 800-82 for OT/ICS guidance simultaneously. Rampart resolves conflicts through a deterministic precedence model. When two overlays modify the same 800-53 control with different parameters, the more restrictive parameter takes precedence. When a sector profile adds a requirement that overlaps with an existing overlay requirement, both apply unless one explicitly supersedes the other. The precedence chain is transparent: every requirement in the composed view traces back to its source overlay, the specific operation that introduced it, and the base control it modifies or extends. Organizations can inspect the composition at any level of detail to understand exactly which sector profile or overlay drives each requirement.

Activating a sector profile does not require engine changes or custom configuration. Rampart's overlay composition is a core capability that applies uniformly to all overlay types: CSF sector profiles, DISA SRGs, CIS Benchmarks, privacy overlays, and organization-defined overlays at the Enterprise tier. Selecting the energy sector profile adds its MODIFY and ADD operations to your assessment. Deactivating it removes them. The composition recalculates automatically. This means organizations operating across multiple sectors can model different overlay combinations to understand their cumulative impact. A utility company that provides both electricity and water services can activate both sector profiles and see the unified requirement set. Sentinel discovers the technology inventory in your connected infrastructure, and Artificer recommends which sector profiles to activate based on what is actually deployed. If Sentinel discovers SCADA systems, programmable logic controllers, and historian databases, Artificer suggests the appropriate sector profile and OT/ICS overlay based on the operational context of those assets.

03
Energy
Energy Sector CSF Profile. NERC CIP Considerations. Availability Priority for Generation and Distribution.

The energy sector CSF profile addresses security requirements for organizations involved in electricity generation, transmission, distribution, and oil and natural gas production and delivery. This sector operates under a threat model where successful attacks produce physical consequences: power outages affecting millions, damage to generation equipment with multi-year replacement timelines, and cascading failures that propagate across interconnected grid infrastructure. The North American Electric Reliability Corporation (NERC) publishes Critical Infrastructure Protection (CIP) standards that are mandatory and enforceable for operators of the Bulk Electric System (BES). NERC CIP standards (CIP-002 through CIP-014) cover asset identification, security management controls, personnel and training, electronic security perimeters, physical security, systems security management, incident reporting, recovery planning, configuration and vulnerability management, information protection, and supply chain risk management. These standards carry financial penalties for non-compliance, enforced through NERC's compliance monitoring and enforcement program.

The energy sector CSF profile elevates availability as the primary security objective. In conventional IT security, the CIA triad (confidentiality, integrity, availability) often prioritizes confidentiality. Energy sector operations invert that priority. A power generation facility that loses availability causes immediate, measurable harm to the communities it serves. The sector profile modifies NIST 800-53 controls accordingly. Control CP-7 (Alternate Processing Site) receives enhanced requirements for maintaining generation and distribution capabilities during primary site failure. Control IR-4 (Incident Handling) is modified to require incident response procedures that prioritize operational continuity over forensic preservation. Control PE-11 (Emergency Power) is elevated to require backup generation capability sufficient to maintain safety-critical control systems indefinitely, not just long enough to perform an orderly shutdown. These modifications reflect the operational reality that energy infrastructure must continue functioning through cyber incidents, not merely recover after them.

Rampart maps NERC CIP requirements to their corresponding NIST 800-53 controls and integrates them into the sector profile overlay. CIP-005 (Electronic Security Perimeter) maps to SC-7 (Boundary Protection) with energy-specific modifications for the boundary between IT networks and OT control system networks. CIP-007 (System Security Management) maps to CM-6 (Configuration Settings), SI-2 (Flaw Remediation), and AU-2 (Event Logging) with modifications that account for the patching constraints of operational technology. Energy sector assets often cannot be patched on standard cycles because taking a system offline for patching means taking a portion of the grid offline. The overlay captures these sector-specific constraints as parameters on the base 800-53 controls, ensuring that compliance assessments reflect the operational realities of energy infrastructure rather than applying IT-centric patching expectations to systems that control physical processes.

04
Water/Transport
Water Sector and Transportation Sector CSF Profiles. Safety-Critical System Requirements.

The water and wastewater sector CSF profile addresses security requirements for systems that treat, distribute, and manage drinking water and wastewater for communities. Water treatment facilities rely on industrial control systems to manage chemical dosing, filtration, disinfection, and distribution pressure. A compromised control system in a water treatment facility can alter chemical concentrations to dangerous levels, disable disinfection processes, or manipulate distribution pressure in ways that cause physical infrastructure damage. The sector profile modifies NIST 800-53 controls to account for these safety-critical functions. Control SI-4 (System Monitoring) receives enhanced requirements for monitoring chemical treatment parameters and alerting on deviations that could indicate tampering. Control PE-3 (Physical Access Control) is modified to require physical isolation of control system components from public-facing infrastructure. Control SC-7 (Boundary Protection) is elevated to require air-gapped or unidirectional network connections between process control networks and enterprise IT networks, reflecting the sector's position that no remote access path should exist that could allow an attacker to modify treatment processes from outside the facility.

The transportation sector CSF profile covers aviation, highway and motor carrier, maritime, mass transit and passenger rail, pipeline systems, freight rail, and postal and shipping. Each transportation mode operates distinct control systems: air traffic management, rail signaling and switching, maritime navigation, and pipeline SCADA systems. The sector profile addresses the common security requirements across these modes while allowing mode-specific modifications. Safety-critical systems in transportation control physical movement: trains, aircraft, ships, and pipeline flows. The consequences of compromise include collisions, derailments, environmental contamination from pipeline ruptures, and disruption of supply chains that depend on functioning transportation networks. The sector profile modifies NIST 800-53 control SA-11 (Developer Testing and Evaluation) to require safety-case analysis for any software update to a transportation control system. Control CM-3 (Configuration Change Control) is modified to require independent safety review before changes to operational control systems, with rollback procedures that can restore safe operating state within seconds.

Both sectors share a common characteristic: the systems being protected have direct, immediate physical consequences when compromised. Rampart composes both sector profiles into a unified assessment when an organization operates across water and transportation domains. Municipal governments that manage both water utilities and public transit systems activate both profiles simultaneously. The composition engine identifies where both profiles modify the same base 800-53 control and applies the more restrictive requirement. Where the water profile requires chemical process monitoring and the transportation profile requires vehicle control system monitoring, both ADD operations apply because they address different physical domains. Sentinel discovers the control system assets in connected infrastructure and maps them to the appropriate sector profile. Programmable logic controllers managing water treatment processes are mapped to the water sector profile. Rail signaling controllers are mapped to the transportation sector profile. The asset-to-profile mapping ensures that sector-specific requirements apply to the correct systems within the authorization boundary.

05
Comms/IT
Communications and IT Sector CSF Profiles. Cross-Sector Interdependency Requirements.

The communications sector CSF profile addresses security requirements for organizations that provide telecommunications, broadcasting, cable, satellite, and internet services. Communications infrastructure is unique among critical infrastructure sectors because it serves as the connective tissue for all other sectors. Energy utilities depend on telecommunications for SCADA communications. Financial institutions depend on it for transaction processing. Emergency services depend on it for 911 dispatch and first responder coordination. A compromise of communications infrastructure cascades into every sector that depends on it. The sector profile reflects this interdependency by modifying NIST 800-53 controls to require resilience levels that account for downstream sector dependencies. Control CP-8 (Telecommunications Services) is elevated to require redundant telecommunications paths with independent failure domains. Control SC-7 (Boundary Protection) is modified to require segmentation that prevents a compromise in one service domain from propagating to infrastructure serving other critical sectors. Control IR-6 (Incident Reporting) is modified to require cross-sector notification when incidents affect infrastructure shared with other critical sectors.

The IT sector CSF profile addresses security requirements for organizations that produce and provide hardware, software, IT systems, and IT services. Like communications, the IT sector is a dependency for virtually every other sector. The IT sector profile focuses on supply chain integrity, software assurance, and the security of products and services that other sectors depend upon. The sector profile modifies NIST 800-53 control SA-12 (Supply Chain Protection) to require provenance verification for components integrated into products destined for critical infrastructure use. Control SI-7 (Software, Firmware, and Information Integrity) is elevated to require code signing, integrity verification, and tamper detection for all software distributed to critical infrastructure customers. Control SR-3 (Supply Chain Controls and Processes) is modified to require documented supply chain risk assessments for all third-party components. These modifications reflect the IT sector's position as a foundational layer: vulnerabilities in IT products propagate into every sector that deploys them.

Cross-sector interdependency is the defining characteristic of both the communications and IT sector profiles. Rampart models these interdependencies through the overlay composition engine. When a telecommunications provider activates the communications sector profile, the composed assessment includes requirements that account for downstream sector dependencies. Alliance extends this visibility to trust networks: organizations can share their sector profile compliance status with partners and downstream consumers who depend on their infrastructure. A cloud service provider activating the IT sector profile can share evidence of supply chain integrity controls with energy and water utilities that consume its services. This cross-sector visibility transforms compliance from an isolated organizational exercise into a network-level assurance model. Sentinel monitors the health of cross-sector dependencies by tracking the infrastructure components that serve multiple sectors and alerting when changes to those components affect the security posture of dependent systems.

06
OT/ICS
Operational Technology Security Differs Fundamentally from IT Security. Availability over Confidentiality.

Operational Technology (OT) encompasses the hardware and software that monitors and controls physical processes, devices, and infrastructure. Industrial Control Systems (ICS) are a subset of OT that includes Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLCs). These systems differ from enterprise IT in fundamental ways that affect every security decision. OT systems often run on purpose-built hardware with proprietary operating systems and communication protocols (Modbus, DNP3, OPC, BACnet) that were designed for reliability and real-time performance, not for security. Many of these protocols transmit data in cleartext and provide no authentication mechanism. The systems they control have operational lifespans measured in decades, not the three-to-five-year refresh cycles common in enterprise IT. Patching an OT system requires taking the physical process it controls offline, which may not be possible without disrupting production, endangering personnel, or violating regulatory operating requirements.

The security priority inversion between IT and OT is not a preference. It is a structural requirement driven by the physical consequences of failure. In enterprise IT, the confidentiality-integrity-availability priority order reflects the primacy of data protection. In OT environments, availability takes precedence because loss of availability means loss of physical control over processes that affect human safety and environmental integrity. A power plant that loses control system availability cannot generate electricity. A water treatment facility that loses control system availability cannot ensure safe drinking water. A chemical plant that loses control system availability cannot maintain safe operating pressures. NIST SP 800-82 (Guide to Operational Technology Security) codifies this priority inversion and provides guidance for adapting NIST 800-53 controls to OT environments. The critical infrastructure overlay incorporates 800-82 guidance as MODIFY operations on the base 800-53 controls, adjusting parameters and implementation requirements to reflect OT-specific constraints.

Specific control modifications for OT/ICS environments illustrate the depth of these differences. NIST 800-53 control SI-2 (Flaw Remediation) in an IT context requires timely patching based on severity. The OT modification requires a safety and operational impact assessment before any patch is applied, with compensating controls (network segmentation, additional monitoring) required when patching is deferred due to operational constraints. Control AC-17 (Remote Access) in an IT context permits authenticated remote access. The OT modification requires that remote access to control system networks be disabled by default, enabled only through a documented change control process, and monitored continuously while active. Control AU-6 (Audit Record Review) in an IT context requires periodic review. The OT modification requires real-time alerting on control system audit events because a delayed review in an OT context means the physical process may have already been affected before anyone examines the log. These modifications are not optional enhancements. They reflect the operational reality that OT security failures produce physical consequences that cannot be reversed by restoring a backup.

07
Evidence
Monitoring and Evidence Collection for OT/ICS Environments. Passive Scanning. Sector-Specific Scoring.

Evidence collection in OT/ICS environments requires fundamentally different approaches than enterprise IT scanning. Active vulnerability scanning, which sends probes and queries to target systems to identify weaknesses, can crash legacy control system components, trigger safety shutdowns, or corrupt process data. A vulnerability scan that reboots a PLC managing a chemical mixing process does not produce a compliance finding. It produces a safety incident. Passive monitoring is the required approach for OT/ICS environments: observing network traffic without injecting packets, analyzing protocol communications without querying endpoints, and collecting evidence from network tap points and monitoring ports rather than direct system interaction. This approach generates evidence of network segmentation effectiveness, protocol usage patterns, unauthorized communication attempts, and configuration baseline compliance without introducing risk to operational systems. Passive monitoring detects when a device communicates with an unexpected endpoint, when a protocol is used outside its expected context, or when network traffic patterns deviate from established baselines.

Collecting evidence continuously for critical infrastructure overlays is difficult because OT/ICS environments lack the API-driven observability that IT systems provide. Energy sector organizations must monitor the electronic security perimeter defined by NERC CIP-005, collect evidence of access control enforcement at the IT/OT boundary, and track changes to communication paths between control centers and remote substations. Water sector organizations must monitor network segments carrying control system traffic and demonstrate segmentation effectiveness between process control networks and enterprise networks. In both cases, evidence must be timestamped, immutable, and traceable to the specific control system asset and network segment that produced it. Maintaining an accurate inventory of OT/ICS assets is another persistent challenge. PLCs, RTUs, HMIs, historians, and engineering workstations must be cataloged with their communication relationships and network segment assignments. Many organizations discover they have assets on their OT networks that were never formally documented, creating gaps in both inventory accuracy and evidence coverage that assessors will flag.

Rampart scores the sector profile overlay assessment using evidence collected by Sentinel. Each sector-specific requirement receives a satisfaction status based on the evidence available: satisfied, partially satisfied, or not satisfied. The scoring accounts for the OT-specific modifications applied by the overlay. If the overlay modifies SI-2 (Flaw Remediation) to accept deferred patching with compensating controls, Rampart evaluates whether the compensating controls (network segmentation, enhanced monitoring) are in place and producing evidence, rather than penalizing the organization for not patching on an IT-centric timeline. Citadel surfaces the sector profile assessment results alongside the base framework assessment, providing a unified view of both the organization's general security posture and its sector-specific compliance status. The action queue in Citadel prioritizes remediation items based on sector-specific risk: a gap in a safety-critical control for an energy sector organization ranks higher than an equivalent gap in a non-safety-critical administrative control.

08
Base Framework
How Critical Infrastructure Overlay Work Advances Your Base Framework Assessment.

Every critical infrastructure sector profile requirement traces back to specific NIST 800-53 controls through the CSF informative references and NIST 800-82 mappings. This traceability is structural, not thematic. When the energy sector profile modifies CP-2 (Contingency Planning) to require cascading failure analysis, satisfying that enhanced requirement simultaneously satisfies the base CP-2 control with evidence that exceeds the base requirement. When the water sector profile adds a requirement for chemical process monitoring derived from SI-4 (System Monitoring), the evidence collected for that sector-specific requirement also satisfies the base SI-4 control. Organizations working through sector profile requirements are simultaneously advancing their base NIST 800-53 assessment with deeper, more operationally specific evidence than the base framework requires. The sector overlay does not create a parallel compliance obligation. It strengthens the base assessment with sector-specific depth.

The cross-framework implications extend beyond NIST 800-53. CMMC Level 2 derives from NIST 800-171, which derives from NIST 800-53 Moderate. FedRAMP baselines are selections from NIST 800-53. SOC 2 trust service criteria map to NIST 800-53 controls. An energy company that satisfies its sector profile requirement for enhanced boundary protection (derived from SC-7) simultaneously advances SC-7 in its base 800-53 assessment, which advances the corresponding CMMC practice if CMMC is active, which advances the FedRAMP requirement if FedRAMP is active, which advances the SOC 2 criterion if SOC 2 is active. This derivation chain compounds through every framework that traces back to NIST 800-53. The critical infrastructure overlay does not add isolated obligations. It adds sector-specific depth to controls that propagate across the organization's entire compliance portfolio. Organizations that maintain a critical infrastructure sector profile receive deeper evidence for shared controls than organizations that assess only the base framework.

Rampart maintains the cross-walk engine that resolves these sector-profile-to-800-53 relationships in both directions. When you view your base NIST 800-53 assessment, each control displays which sector profile requirements contribute to its satisfaction and what evidence supports each. When you view the sector profile overlay, each requirement displays the base 800-53 control it derives from and the current satisfaction status across all active overlays. Artificer identifies which sector profile requirements deliver the greatest cross-framework impact: requirements that, when satisfied, advance the most controls across the most active frameworks. This prioritization ensures remediation effort produces maximum posture improvement across the entire compliance portfolio. For critical infrastructure organizations operating under multiple regulatory mandates, this cross-framework efficiency is not a convenience. It is the difference between maintaining compliance as an achievable operational practice and drowning in disconnected assessment obligations that duplicate effort and fragment evidence across isolated compliance programs.

Something is being forged.

The full platform is under active development. Reach out to learn more or get early access.