io.github.Ansvar-Systems/ot-security-mcp

编码与调试

by ansvar-systems

聚焦 OT 安全标准,涵盖 IEC 62443、NIST 800-82/53,以及 MITRE ATT&CK for ICS。

什么是 io.github.Ansvar-Systems/ot-security-mcp

聚焦 OT 安全标准,涵盖 IEC 62443、NIST 800-82/53,以及 MITRE ATT&CK for ICS。

README

OT Security MCP Server

IEC 62443 for the AI age.

npm version License GitHub stars Database Tests OpenSSF Scorecard Security

Query IEC 62443, NIST 800-82, NIST 800-53, and MITRE ATT&CK for ICS — the complete OT security framework stack — directly from Claude, Cursor, or any MCP-compatible client.

If you're securing industrial control systems, manufacturing plants, energy infrastructure, or critical OT environments, this is your security standards reference.

Built by Ansvar Systems — Stockholm, Sweden


Why This Exists

OT security standards are scattered across ISA PDFs, NIST publications, and MITRE matrices. Whether you're:

  • A control systems engineer implementing IEC 62443 security levels
  • A security architect designing network segmentation with the Purdue Model
  • A compliance officer mapping NIS2 requirements to IEC controls
  • A threat hunter investigating MITRE ATT&CK for ICS techniques
  • A product team building secure PLCs, SCADA systems, or industrial IoT devices

...you shouldn't need to juggle 6 different documentation sites and 200 pages of standards. Ask Claude. Get the exact requirement. With context.

This MCP server makes OT security standards searchable, cross-referenceable, and AI-readable.


Quick Start

Installation

bash
npm install @ansvar/ot-security-mcp

Claude Desktop

Add to your claude_desktop_config.json:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json

json
{
 "mcpServers": {
 "ot-security": {
 "command": "npx",
 "args": ["-y", "@ansvar/ot-security-mcp"]
 }
 }
}

Restart Claude Desktop. Done.

Cursor / VS Code

json
{
 "mcp.servers": {
 "ot-security": {
 "command": "npx",
 "args": ["-y", "@ansvar/ot-security-mcp"]
 }
 }
}

Public Endpoint (Streamable HTTP)

Connect from any MCP client (Claude Desktop, ChatGPT, Cursor, VS Code, GitHub Copilot):

code
https://mcp.ansvar.eu/ot-security/mcp

Claude Code:

bash
claude mcp add ot-security --transport http https://mcp.ansvar.eu/ot-security/mcp

Claude Desktop / Cursor (claude_desktop_config.json):

json
{
 "mcpServers": {
 "ot-security": {
 "type": "url",
 "url": "https://mcp.ansvar.eu/ot-security/mcp"
 }
 }
}

No authentication required. See all Ansvar MCP endpoints.

Example Queries

Once connected, just ask naturally:

IEC 62443 Security Levels

  • "What are the IEC 62443 requirements for Security Level 2?"
  • "Which security level should I target for a water treatment plant?"
  • "Compare requirements between SL-2 and SL-3"
  • "What is SR 1.1 (identification and authentication) in IEC 62443?"

Network Segmentation & Zones

  • "How should I segment my OT network using the Purdue Model?"
  • "What security controls belong at Level 3 of the Purdue Model?"
  • "Design a zone and conduit architecture for a manufacturing facility"
  • "What's the difference between a zone and a conduit in IEC 62443-3-2?"

Threat Intelligence

  • "What MITRE ATT&CK techniques target PLCs?"
  • "How do attackers perform lateral movement in ICS environments?"
  • "Show me MITRE ICS techniques for T0800 (Modify Control Logic)"
  • "Which mitigations prevent Man-in-the-Middle attacks on Modbus?"

NIST Guidance

  • "What are NIST's recommendations for OT asset management?"
  • "How does NIST 800-82 address incident response in control systems?"
  • "Map NIST 800-82 guidance to NIST 800-53 controls"

Cross-Standard Mapping

  • "Map IEC 62443 SR 1.1 to equivalent NIST controls"
  • "Which NIST 800-53 controls support IEC 62443 Security Level 3?"
  • "Compare identification and authentication across IEC and NIST"

Industry-Specific

  • "What security requirements apply to a power generation facility?"
  • "IEC 62443 requirements for pharmaceutical manufacturing"
  • "Security controls for a water/wastewater utility"

More examples: See docs/use-cases.md for industry-specific scenarios


What's Included

Standards Coverage

  • IEC 62443-3-3 — 67 System Security Requirements (SRs) across 7 foundational requirements
  • IEC 62443-4-2 — 51 Component Requirements (CRs) for embedded devices, host devices, network devices, and applications
  • IEC 62443-3-2 — Security risk assessment, zones & conduits, Purdue Model
  • NIST SP 800-53 Rev 5 — 228 OT-relevant controls from 12 control families
  • NIST SP 800-82 Rev 3 — Guide to Operational Technology Security
  • MITRE ATT&CK for ICS — 83 techniques, 52 mitigations, 331 relationships

Features

  • Full-Text Search — Find relevant requirements across all standards instantly
  • Security Level Mapping — Query IEC 62443 requirements by SL-1 through SL-4
  • Zone/Conduit Guidance — Network segmentation design with Purdue Model
  • Requirement Rationale — Understand WHY requirements exist, not just what they say
  • Threat Intelligence — MITRE ATT&CK techniques mapped to defensive controls
  • Cross-Standard Mappings — IEC ↔ NIST control relationships
  • Component Type Filtering — Requirements for embedded devices, hosts, networks, or applications

Data Quality

  • 238 Requirements — IEC 62443 foundation + NIST 800-82 guidance
  • 228 NIST 800-53 Controls — Automated OSCAL ingestion from official source
  • 83 MITRE ICS Techniques — Complete ATT&CK for ICS matrix
  • 16 Cross-Standard Mappings — NIST 800-82 ↔ 800-53 validated mappings
  • Daily Updates — Automatic freshness checks for NIST and MITRE sources

Detailed coverage: docs/coverage.md Use cases by industry: docs/use-cases.md Available tools: docs/tools.md


See It In Action

Why This Works

Authoritative Source Data:

  • IEC 62443: User-supplied (licensed standards) — you provide your own licensed data
  • NIST 800-53: Automated OSCAL ingestion from official NIST GitHub
  • NIST 800-82: Curated guidance from official PDF publication
  • MITRE ATT&CK: Automated STIX 2.0 ingestion from official MITRE repository
  • All data stored in SQLite with full-text search (FTS5)

Smart Architecture:

  • Security level filtering uses junction tables (many-to-many relationships)
  • Zone/conduit guidance generates markdown with Purdue Model context
  • Requirement rationale includes regulatory drivers and related standards
  • Cross-standard mappings use confidence scores for quality assessment

Technical Stack:

code
Official Source → Parse → Validate → SQLite → MCP Tools → AI Response
 ↑ ↑ ↑
 OSCAL/STIX JSON Schema FTS5 Search

Example: Traditional vs. This MCP

Traditional ApproachThis MCP Server
Buy IEC 62443 PDFs ($500+)Ingest your licensed IEC data once
Navigate 300+ page security level tables"What requirements apply to SL-2?" → instant answer
Manual Purdue Model diagramsget_zone_conduit_guidance → generated architecture
Cross-reference NIST ↔ IEC manuallycompare_ot_requirements → mapped instantly
Search MITRE matrices by hand"Show me PLC attacks" → filtered techniques
6 different documentation sitesOne unified query interface

Traditional example: Open IEC 62443-3-3 PDF → Find security level table → Ctrl+F "SR 1" → Read 15 pages → Cross-reference to IEC 62443-4-2 → Repeat for NIST

This MCP: "What are all IEC 62443 requirements for Security Level 2 targeting embedded devices?" → Done.


Important Disclaimers

IEC 62443 Licensing

** IEC 62443 CONTENT NOT INCLUDED**

IEC 62443 is a copyrighted standard published by the International Society of Automation (ISA) and International Electrotechnical Commission (IEC).

This MCP server provides:

  • Database schema and ingestion tools for IEC 62443 data
  • JSON templates showing the expected data structure
  • Sample data (2 requirements) demonstrating the format

You must provide:

  • Your own licensed copies of IEC 62443 standards
  • Your own JSON files created from your licensed standards

How to obtain IEC 62443 standards:

  • Purchase from ISA or IEC
  • Prices: ~$150-200 per part (3-3, 4-2, 3-2)

Ingestion guide: See docs/ingestion/iec62443-guide.md

Legal Advice

** THIS TOOL IS NOT SECURITY CONSULTING OR LEGAL ADVICE **

Security requirements are sourced from official public standards (NIST, MITRE) and user-supplied licensed standards (IEC 62443). However:

  • Security level targeting is risk-based and requires proper threat modeling
  • Zone/conduit architectures are design aids, not prescriptive solutions
  • Cross-standard mappings are interpretive aids, not official guidance
  • MITRE techniques are threat intelligence, not vulnerability assessments

Always:

  • Conduct proper risk assessments for your specific environment
  • Engage qualified OT security professionals for implementation guidance
  • Verify against official standard publications
  • Follow your organization's security policies and procedures

NIST & MITRE Data

Public domain content — NIST 800-53, NIST 800-82, and MITRE ATT&CK for ICS data are sourced from official U.S. government repositories and are in the public domain. No restrictions on use or distribution.


Related Projects: Ansvar Compliance Suite

This server is part of Ansvar's MCP ecosystem for industrial and enterprise security:

OT Security MCP (This Project)

Query IEC 62443, NIST 800-82/53, and MITRE ATT&CK for ICS

  • Specialized for OT/ICS environments (manufacturing, energy, critical infrastructure)
  • Security levels, Purdue Model, zone/conduit architecture
  • MITRE ATT&CK for ICS threat intelligence
  • Install: npm install @ansvar/ot-security-mcp

Security Controls MCP

Query 1,451 security controls across 28 IT/OT frameworks

  • ISO 27001, NIST CSF, DORA, PCI DSS, SOC 2, CMMC, and 22 more
  • Bidirectional framework mapping and gap analysis
  • Works with OT Security MCP for complete IT/OT coverage
  • Install: pipx install security-controls-mcp

🇪🇺 EU Regulations MCP

Query 47 EU regulations including NIS2 and Cyber Resilience Act

  • GDPR, AI Act, DORA, NIS2, MDR, CRA, and 41 more
  • Critical for EU OT operators under NIS2 directive
  • Install: npx @ansvar/eu-regulations-mcp

🇺🇸 US Regulations MCP

Query US compliance laws including TSA Pipeline Security

  • HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, and 9 more
  • Relevant for US critical infrastructure operators
  • Install: npm install @ansvar/us-regulations-mcp

How They Work Together for OT Security

Complete OT compliance workflow:

code
1. "What are NIS2 requirements for energy sector OT systems?"
 → EU Regulations MCP returns NIS2 Article 21 requirements

2. "What IEC 62443 security level satisfies NIS2 Article 21?"
 → OT Security MCP recommends Security Level 2-3 based on risk assessment

3. "Map IEC 62443-4-2 SR 1.1 to NIST 800-53 controls"
 → Security Controls MCP shows bidirectional mapping to AC-2, IA-2, etc.

4. "What MITRE ATT&CK techniques target this configuration?"
 → OT Security MCP shows relevant ICS attack techniques and mitigations

Stack these servers for:

  • EU OT operators (NIS2 + IEC 62443 + ISO 27001)
  • US critical infrastructure (NIST + IEC 62443 + sector-specific regulations)
  • Global manufacturers (All compliance + OT security + framework mapping)

About Ansvar Systems

We build AI-accelerated threat modeling and compliance tools for automotive OEMs, Tier 1 suppliers, industrial manufacturers, and critical infrastructure operators. This MCP server started as our internal IEC 62443 reference tool — turns out everyone securing OT environments has the same "6 documentation sites, 12 PDFs" problem.

So we're open-sourcing it. Navigating IEC 62443 security levels shouldn't require a spreadsheet and a law degree.

ansvar.eu — Stockholm, Sweden

Industries we serve:

  • Automotive (ISO 21434, UN R155)
  • Industrial Manufacturing (IEC 62443)
  • Energy & Utilities (NERC CIP, IEC 62443)
  • Medical Devices (IEC 81001-5-1, IEC 62443-4-2)

Documentation

Getting Started

Tools & Features

Use Cases

Development

Project Planning


Directory Review Notes

Testing Account and Sample Data

This server is read-only and does not require a login account for functional review. For directory review, use the bundled dataset and these sample prompts:

  • "What IEC 62443 requirements apply to Security Level 2?"
  • "Show MITRE ICS techniques related to PLC manipulation."
  • "Map IEC 62443 SR 1.1 to NIST controls."

Remote Authentication (OAuth 2.0)

If you deploy a remote authenticated endpoint, use OAuth 2.0 over TLS with certificates from recognized authorities. If deployed in read-only unauthenticated mode, document that deployment policy explicitly.


Roadmap

Stage 3 (Planned Q2 2026)

  • IEC 62443-2-4 — Supplier security requirements (DORA/NIS2 relevance)
  • Rich Cross-Standard Mappings — IEC ↔ NIST ↔ MITRE with confidence scores
  • Automated Mapping Suggestions — ML-based requirement similarity
  • Compare Requirements Tool — Side-by-side multi-standard comparison

Stage 4 (Planned Q3 2026)

  • NERC CIP — North American energy sector requirements
  • Sector Applicability Engine — "Which standards apply to my facility?"
  • EU Regulatory Crosswalk — NIS2, DORA, CRA mappings to IEC 62443

See: ROADMAP.md for full feature timeline


More Open Source from Ansvar

We maintain a family of MCP servers for compliance and security professionals:

ServerDescriptionInstall
EU Regulations47 EU regulations (GDPR, AI Act, DORA, NIS2, MiFID II, eIDAS, MDR...)npx @ansvar/eu-regulations-mcp
US RegulationsHIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA 21 CFR Part 11, state privacy lawsnpx @ansvar/us-regulations-mcp
Security Controls1,451 controls across 28 frameworks (ISO 27001, NIST CSF, PCI DSS, CMMC...)pipx install security-controls-mcp
AutomotiveUNECE R155/R156, ISO 21434 for automotive cybersecuritynpx @ansvar/automotive-cybersecurity-mcp
SanctionsOffline sanctions screening with OpenSanctions (30+ lists)pip install ansvar-sanctions-mcp

Browse all projects: ansvar.eu/open-source


Contributing

We welcome contributions! See CONTRIBUTING.md for:

  • Adding new standards
  • Improving cross-standard mappings
  • Enhancing tool capabilities
  • Fixing bugs or improving documentation

License

Code: Apache License 2.0 (see LICENSE)

Data:

  • IEC 62443: User-supplied (requires license from ISA/IEC)
  • NIST 800-53, 800-82: Public domain (U.S. government work)
  • MITRE ATT&CK for ICS: Apache 2.0 (MITRE Corporation)

Support

Community Support

Commercial Support

Need help with:

  • IEC 62443 security level targeting for your facility?
  • Custom zone/conduit architectures for complex OT networks?
  • Threat modeling using MITRE ATT&CK for ICS?
  • NIS2 or DORA compliance mapping to IEC 62443?

Contact: info@ansvar.eu


<p align="center"> <sub>Built with care in Stockholm, Sweden</sub> </p>

常见问题

io.github.Ansvar-Systems/ot-security-mcp 是什么?

聚焦 OT 安全标准,涵盖 IEC 62443、NIST 800-82/53,以及 MITRE ATT&CK for ICS。

相关 Skills

前端设计

by anthropics

Universal
热门

面向组件、页面、海报和 Web 应用开发,按鲜明视觉方向生成可直接落地的前端代码与高质感 UI,适合做 landing page、Dashboard 或美化现有界面,避开千篇一律的 AI 审美。

想把页面做得既能上线又有设计感,就用前端设计:组件到整站都能产出,难得的是能避开千篇一律的 AI 味。

编码与调试
未扫描111.8k

网页构建器

by anthropics

Universal
热门

面向复杂 claude.ai HTML artifact 开发,快速初始化 React + Tailwind CSS + shadcn/ui 项目并打包为单文件 HTML,适合需要状态管理、路由或多组件交互的页面。

在 claude.ai 里做复杂网页 Artifact 很省心,多组件、状态和路由都能顺手搭起来,React、Tailwind 与 shadcn/ui 组合效率高、成品也更精致。

编码与调试
未扫描111.8k

网页应用测试

by anthropics

Universal
热门

用 Playwright 为本地 Web 应用编写自动化测试,支持启动开发服务器、校验前端交互、排查 UI 异常、抓取截图与浏览器日志,适合调试动态页面和回归验证。

借助 Playwright 一站式验证本地 Web 应用前端功能,调 UI 时还能同步查看日志和截图,定位问题更快。

编码与调试
未扫描111.8k

相关 MCP Server

GitHub

编辑精选

by GitHub

热门

GitHub 是 MCP 官方参考服务器,让 Claude 直接读写你的代码仓库和 Issues。

这个参考服务器解决了开发者想让 AI 安全访问 GitHub 数据的问题,适合需要自动化代码审查或 Issue 管理的团队。但注意它只是参考实现,生产环境得自己加固安全。

编码与调试
83.1k

by Context7

热门

Context7 是实时拉取最新文档和代码示例的智能助手,让你告别过时资料。

它能解决开发者查找文档时信息滞后的问题,特别适合快速上手新库或跟进更新。不过,依赖外部源可能导致偶尔的数据延迟,建议结合官方文档使用。

编码与调试
51.8k

by tldraw

热门

tldraw 是让 AI 助手直接在无限画布上绘图和协作的 MCP 服务器。

这解决了 AI 只能输出文本、无法视觉化协作的痛点——想象让 Claude 帮你画流程图或白板讨论。最适合需要快速原型设计或头脑风暴的开发者。不过,目前它只是个基础连接器,你得自己搭建画布应用才能发挥全部潜力。

编码与调试
46.2k

评论