OT security standards: IEC 62443, NIST 800-82/53, MITRE ATT&CK for ICS
OT security standards: IEC 62443, NIST 800-82/53, MITRE ATT&CK for ICS
Valid MCP server (1 strong, 1 medium validity signals). No known CVEs in dependencies. Package registry verified. Imported from the Official MCP Registry. Trust signals: trusted author (138/138 approved).
4 files analyzed · 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-ansvar-systems-ot-security-mcp": {
"args": [
"-y",
"@ansvar/ot-security-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
IEC 62443 for the AI age.
Query IEC 62443, NIST 800-82, NIST 800-53, and MITRE ATT&CK for ICS — the complete OT security framework stack — directly from Claude, Cursor, or any MCP-compatible client.
If you're securing industrial control systems, manufacturing plants, energy infrastructure, or critical OT environments, this is your security standards reference.
Built by Ansvar Systems — Stockholm, Sweden
OT security standards are scattered across ISA PDFs, NIST publications, and MITRE matrices. Whether you're:
...you shouldn't need to juggle 6 different documentation sites and 200 pages of standards. Ask Claude. Get the exact requirement. With context.
This MCP server makes OT security standards searchable, cross-referenceable, and AI-readable.
npm install @ansvar/ot-security-mcp
Add to your claude_desktop_config.json:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"ot-security": {
"command": "npx",
"args": ["-y", "@ansvar/ot-security-mcp"]
}
}
}
Restart Claude Desktop. Done.
{
"mcp.servers": {
"ot-security": {
"command": "npx",
"args": ["-y", "@ansvar/ot-security-mcp"]
}
}
}
Connect from any MCP client (Claude Desktop, ChatGPT, Cursor, VS Code, GitHub Copilot):
https://mcp.ansvar.eu/ot-security/mcp
Claude Code:
claude mcp add ot-security --transport http https://mcp.ansvar.eu/ot-security/mcp
Claude Desktop / Cursor (claude_desktop_config.json):
{
"mcpServers": {
"ot-security": {
"type": "url",
"url": "https://mcp.ansvar.eu/ot-security/mcp"
}
}
}
No authentication required. See all Ansvar MCP endpoints.
Once connected, just ask naturally:
More examples: See docs/use-cases.md for industry-specific scenarios
Detailed coverage: docs/coverage.md Use cases by industry: docs/use-cases.md Available tools: docs/tools.md
Authoritative Source Data:
Smart Architecture:
Technical Stack:
Official Source → Parse → Validate → SQLite → MCP Tools → AI Response
↑ ↑ ↑
OSCAL/STIX JSON Schema FTS5 Search
| Traditional Approach | This MCP Server |
|---|---|
| Buy IEC 62443 PDFs ($500+) | Ingest your licensed IEC data once |
| Navigate 300+ page security level tables | "What requirements apply to SL-2?" → instant answer |
| Manual Purdue Model diagrams | get_zone_conduit_guidance → generated architecture |
| Cross-reference NIST ↔ IEC manually | compare_ot_requirements → mapped instantly |
| Search MITRE matrices by hand | "Show me PLC attacks" → filtered techniques |
| 6 different documentation sites | One unified query interface |
Traditional example: Open IEC 62443-3-3 PDF → Find security level table → Ctrl+F "SR 1" → Read 15 pages → Cross-reference to IEC 62443-4-2 → Repeat for NIST
This MCP: "What are all IEC 62443 requirements for Security Level 2 targeting embedded devices?" → Done.
** IEC 62443 CONTENT NOT INCLUDED**
IEC 62443 is a copyrighted standard published by the International Society of Automation (ISA) and International Electrotechnical Commission (IEC).
This MCP server provides:
- Database schema and ingestion tools for IEC 62443 data
- JSON templates showing the expected data structure
- Sample data (2 requirements) demonstrating the format
You must provide:
- Your own licensed copies of IEC 62443 standards
- Your own JSON files created from your licensed standards
How to obtain IEC 62443 standards:
Ingestion guide: See docs/ingestion/iec62443-guide.md
** THIS TOOL IS NOT SECURITY CONSULTING OR LEGAL ADVICE **
Security requirements are sourced from official public standards (NIST, MITRE) and user-supplied licensed standards (IEC 62443). However:
- Security level targeting is risk-based and requires proper threat modeling
- Zone/conduit architectures are design aids, not prescriptive solutions
- Cross-standard mappings are interpretive aids, not official guidance
- MITRE techniques are threat intelligence, not vulnerability assessments
Always:
- Conduct proper risk assessments for your specific environment
- Engage qualified OT security professionals for implementation guidance
- Verify against official standard publications
- Follow your organization's security policies and procedures
Public domain content — NIST 800-53, NIST 800-82, and MITRE ATT&CK for ICS data are sourced from official U.S. government repositories and are in the public domain. No restrictions on use or distribution.
This server is part of Ansvar's MCP ecosystem for industrial and enterprise security:
Query IEC 62443, NIST 800-82/53, and MITRE ATT&CK for ICS
npm install @ansvar/ot-security-mcpQuery 1,451 security controls across 28 IT/OT frameworks
pipx install security-controls-mcpQuery 47 EU regulations including NIS2 and Cyber Resilience Act
npx @ansvar/eu-regulations-mcpQuery US compliance laws including TSA Pipeline Security
npm install @ansvar/us-regulations-mcpComplete OT compliance workflow:
1. "What are NIS2 requirements for energy sector OT systems?"
→ EU Regulations MCP returns NIS2 Article 21 requirements
2. "What IEC 62443 security level satisfies NIS2 Article 21?"
→ OT Security MCP recommends Security Level 2-3 based on risk assessment
3. "Map IEC 62443-4-2 SR 1.1 to NIST 800-53 controls"
→ Security Controls MCP shows bidirectional mapping to AC-2, IA-2, etc.
4. "What MITRE ATT&CK techniques target this configuration?"
→ OT Security MCP shows relevant ICS attack techniques and mitigations
Stack these servers for:
We build AI-accelerated threat modeling and compliance tools for automotive OEMs, Tier 1 suppliers, industrial manufacturers, and critical infrastructure operators. This MCP server started as our internal IEC 62443 reference tool — turns out everyone securing OT environments has the same "6 documentation sites, 12 PDFs" problem.
So we're open-sourcing it. Navigating IEC 62443 security levels shouldn't require a spreadsheet and a law degree.
ansvar.eu — Stockholm, Sweden
Industries we serve:
This server is read-only and does not require a login account for functional review. For directory review, use the bundled dataset and these sample prompts:
If you deploy a remote authenticated endpoint, use OAuth 2.0 over TLS with certificates from recognized authorities. If deployed in read-only unauthenticated mode, document that deployment policy explicitly.
See: ROADMAP.md for full feature timeline
We maintain a family of MCP servers for compliance and security professionals:
| Server | Description | Install |
|---|---|---|
| EU Regulations | 47 EU regulations (GDPR, AI Act, DORA, NIS2, MiFID II, eIDAS, MDR...) | npx @ansvar/eu-regulations-mcp |
| US Regulations | HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA 21 CFR Part 11, state privacy laws | npx @ansvar/us-regulations-mcp |
| Security Controls | 1,451 controls across 28 frameworks (ISO 27001, NIST CSF, PCI DSS, CMMC...) | pipx install security-controls-mcp |
| Automotive | UNECE R155/R156, ISO 21434 for automotive cybersecurity | npx @ansvar/automotive-cybersecurity-mcp |
| Sanctions | Offline sanctions screening with OpenSanctions (30+ lists) | pip install ansvar-sanctions-mcp |
Browse all projects: ansvar.eu/open-source
We welcome contributions! See CONTRIBUTING.md for:
Code: Apache License 2.0 (see LICENSE)
Data:
Need help with:
Contact: info@ansvar.eu
Be the first to review this server!
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.
by Taylorwilsdon · Productivity
Control Gmail, Calendar, Docs, Sheets, Drive, and more from your AI