{"id":8166,"date":"2025-12-26T09:52:04","date_gmt":"2025-12-26T17:52:04","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=8166"},"modified":"2025-12-26T10:24:46","modified_gmt":"2025-12-26T18:24:46","slug":"cisa_ai_guidance","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/","title":{"rendered":"CISA\u2019s Guidance on AI in OT and the Security Implications"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Artificial intelligence is increasingly being integrated into Operational Technology (OT) environments. From automated inspection and predictive maintenance to robotics and decision support, AI is becoming part of how industrial systems operate and adapt. These capabilities can improve efficiency and resilience, but they also introduce new safety and security risks that differ from those found in traditional IT systems.<\/p>\n<p>To address these concerns, the <strong>Cybersecurity and Infrastructure Security Agency (CISA)<\/strong>, together with the <strong>National Security Agency (NSA)<\/strong> and international partners, recently released <em>Principles for the Secure Integration of Artificial Intelligence in Operational Technology<\/em>. This joint guidance outlines four foundational principles intended to help organizations balance the benefits of AI with the unique risks of OT environments.<\/p>\n<p><strong>Why AI Changes the Risk Profile of OT Systems<\/strong><\/p>\n<p>Operational technology environments place strict constraints on security. Systems often run continuously, depend on specialized hardware, and directly control physical processes. When something goes wrong, the impact can be immediate.<\/p>\n<p>AI increases this risk by introducing behavior that can change under shifting inputs, degraded sensors, or manipulation. In OT environments, these changes can affect control logic and physical operations, not just software outputs. CISA\u2019s guidance reflects this reality by treating AI as a safety-relevant capability whose behavior must be understood and monitored within the context where it operates.<\/p>\n<p><strong>The Four Principles for Secure AI-in-OT<\/strong><\/p>\n<p>The guidance presents <strong>four core principles<\/strong> that owners and operators of OT systems should follow:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><ol>\n<li><strong>Understand AI:<\/strong><br \/>\nOrganizations should build a strong foundational understanding of AI technologies, including how they work, common vulnerabilities, and how they interact with OT systems. This includes educating personnel on AI risks, secure development lifecycles, and the potential impacts of AI decision-making on physical operations.<\/li>\n<li><strong>Consider AI Use in the OT Domain:<\/strong><br \/>\nNot all AI applications are created equal, and the decision to integrate AI into OT should be driven by clear use cases where benefits outweigh risks. This principle also emphasizes the importance of assessing data security risks, vendor transparency, and long-term challenges.<\/li>\n<li><strong>Establish AI Governance and Assurance Frameworks:<\/strong><br \/>\nEffective AI governance ensures that AI systems deployed in OT environments are continuously tested, monitored, and aligned with security and safety standards. It also includes establishing assurance practices that integrate AI into broader organizational risk and compliance frameworks.<\/li>\n<li><strong>Embed Oversight and Failsafe Practices:<\/strong><br \/>\nAI systems must have mechanisms for ongoing oversight, real-time monitoring, and built-in failsafes to prevent unintended consequences in safety-critical environments. Operators are encouraged to integrate AI into incident response plans and maintain transparency around AI operation.<\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"1024\" title=\"4 principles of secure AI\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=1024%2C1024&#038;ssl=1\" alt class=\"img-responsive wp-image-8167\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=66%2C66&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=100%2C100&amp;ssl=1 100w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=200%2C200&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=400%2C400&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=500%2C500&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=600%2C600&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=700%2C700&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?resize=800%2C800&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/4-principles-of-secure-AI.png?fit=1024%2C1024&amp;ssl=1 1024w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 1024px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>Closing the Gap Between Policy and Security<\/strong><\/p>\n<p>CISA\u2019s guidance is intentionally high-level and avoids prescribing specific controls or tools. That flexibility reflects the diversity of OT environments, but it also leaves organizations with a practical challenge.<\/p>\n<p>Teams still need ways to determine whether AI systems behave safely under real-world conditions. In OT settings, output checks and policy documentation are often insufficient when sensor noise, environmental variation, or manipulation can change model behavior. Turning principles into operational confidence requires technical assurance and visibility into how models respond as conditions change.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"174\" title=\"FortiLayer-FF-transparent\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=1024%2C174&#038;ssl=1\" alt class=\"img-responsive wp-image-7197\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=66%2C11&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=177%2C30&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=200%2C34&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=300%2C51&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=320%2C54&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=400%2C68&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=460%2C78&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=500%2C85&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=540%2C92&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=600%2C102&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=669%2C114&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=700%2C119&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=768%2C131&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=800%2C136&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=940%2C160&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=1024%2C174&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?fit=1123%2C191&amp;ssl=1 1123w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><p><strong>Bridging the Guidance with FortiLayer<\/strong><\/p>\n<p>CISA\u2019s principles emphasize understanding AI behavior, evaluating risk in context, and maintaining ongoing oversight in operational environments. Meeting those expectations requires more than output checks or policy documentation. Teams need visibility into how models behave when conditions change.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><p>ObjectSecurity\u2019s FortiLayer supports this by analyzing how AI models respond to adversarial, noisy, or degraded inputs. By examining how those inputs influence model decisions, FortiLayer reveals failure modes that may not appear during normal testing but can create safety or reliability risks in OT environments.<\/p>\n<p>This behavior-driven analysis helps organizations assess whether AI is appropriate for a given OT use case, identify where models need hardening, and maintain confidence as systems evolve. FortiLayer integrates into existing engineering and security workflows and produces technical evidence that supports continuous assurance, governance, and oversight aligned with CISA\u2019s guidance.<\/p>\n<p><strong>Conclusion \u2014 What This Means for AI in OT<\/strong><\/p>\n<p>As AI becomes more embedded in operational technology environments, expectations around safety, reliability, and transparency will continue to rise. Systems that influence physical processes cannot be treated as experimental or opaque. They must be understood, monitored, and governed with the same rigor applied to other safety-relevant components.<\/p>\n<p>CISA\u2019s AI-in-OT principles provide a clear framework for managing this risk, but applying them in practice requires more than policy alignment. Organizations need technical assurance that AI systems behave as expected under real-world conditions. By focusing on measurable behavior and continuous evaluation, teams can adopt AI in OT environments with confidence while preserving the safety and resilience that critical infrastructure demands.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":8175,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,66,87],"tags":[],"class_list":["post-8166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-data-security","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA\u2019s Guidance on AI in OT and the Security Implications - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"CISA\u2019s Guidance on AI in OT and the Security Implications\",\"datePublished\":\"2025-12-26T17:52:04+00:00\",\"dateModified\":\"2025-12-26T18:24:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/\"},\"wordCount\":5460,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"Data Security\",\"Technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/\",\"name\":\"CISA\u2019s Guidance on AI in OT and the Security Implications - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-12-26T17:52:04+00:00\",\"dateModified\":\"2025-12-26T18:24:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/cisa_ai_guidance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA\u2019s Guidance on AI in OT and the Security Implications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA\u2019s Guidance on AI in OT and the Security Implications - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"CISA\u2019s Guidance on AI in OT and the Security Implications","datePublished":"2025-12-26T17:52:04+00:00","dateModified":"2025-12-26T18:24:46+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/"},"wordCount":5460,"image":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","Data Security","Technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/","url":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/","name":"CISA\u2019s Guidance on AI in OT and the Security Implications - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1","datePublished":"2025-12-26T17:52:04+00:00","dateModified":"2025-12-26T18:24:46+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/cisa_ai_guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/cisa_ai_guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"CISA\u2019s Guidance on AI in OT and the Security Implications"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/CISA-AI-blog-FI_1.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=8166"}],"version-history":[{"count":6,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8166\/revisions"}],"predecessor-version":[{"id":8178,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/8166\/revisions\/8178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/8175"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=8166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=8166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=8166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}