Manufacturing · Self-assessment · Free
Manufacturing Security Assessment.
Twenty questions across the five risk domains that actually matter for manufacturers — OT/IT segmentation, ICS/SCADA hardening, IP protection, supply chain, and incident response. About ten minutes. No email required to see your score.
- Mapped to NIST CSF, NIST 800-82r3, IEC 62443
- Maturity scored Initial → Optimized per domain
- Scoring runs locally in your browser
- Optional written report + roadmap on request
What it covers
Five domains. Twenty honest questions.
Built around the threat picture we actually see in manufacturing engagements: ransomware crossing from corporate IT to the shop floor, customer questionnaires with teeth, and the hard reality that some HMIs simply cannot be patched on a normal cadence. The assessment gives you a maturity score per domain so the conversation with leadership can be about the gap — not the score.
-
OT/IT Security
Segmentation between corporate IT and the shop floor — the most-abused ransomware path into manufacturing.
-
ICS / SCADA
Hardening of PLCs, HMIs, historians, and the maintenance workflow that keeps them patched.
-
IP Protection
Protecting CAD files, formulations, process know-how, and customer / contract data from theft and exfiltration.
-
Supply Chain
Supplier and customer security requirements, third-party access, and the questionnaires that show up before purchase orders.
-
Incident Response
What happens between the alarm and the first shift back online — the discipline that turns a ransomware event into hours instead of weeks.
-
What does the assessment cover?
Twenty questions across five domains: OT/IT segmentation, ICS/SCADA hardening, IP protection, supply-chain security, and incident response. Each answer maps to a maturity level (Initial, Developing, Managed, Optimized) cross-walked to NIST CSF, NIST 800-82r3, IEC 62443, and where relevant CMMC 2.0 / NIST 800-171.
-
How long does it take?
About ten minutes. You can stop at any point — your answers are scored locally in the browser and never leave your device until you choose to request a written report.
-
Do I need to give an email address?
No. The assessment runs entirely client-side. If you want a written report and a 30/60/90-day plan from our team, you can request one at the end — but the score itself is yours immediately.
-
Is this a substitute for a real audit?
No. It is a fast, honest self-check — meant to surface the obvious gaps a manufacturer should fix before a customer questionnaire, a cyber-insurance renewal, or — worst case — a ransomware event. A formal audit, pen test, or CMMC assessment is a separate engagement. See penetration testing and CMMC compliance.
Talk to a real engineer
Want a partner who treats downtime like the actual problem?
Whether you're shoring up after a near-miss, fielding a customer questionnaire, or scoping a managed SOC for the plant — we can help.