{"id":108311,"date":"2025-09-11T06:05:09","date_gmt":"2025-09-11T10:05:09","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=108311"},"modified":"2025-09-11T07:16:39","modified_gmt":"2025-09-11T11:16:39","slug":"operational-technology-security-why-you-need-to-build-an-asset-inventory-today","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/","title":{"rendered":"Operational Technology Security: Why You Need to Build an Asset Inventory Today"},"content":{"rendered":"<p>As Field CTO at Forescout, I spend much of my time working with customers across critical infrastructure, manufacturing, and energy sectors who face an increasingly complex challenge: securing operational technology environments.<\/p>\n<p>And calling it a challenge is an understatement. Between 2022 and 2024, there was a <a href=\"\/research-labs\/2024-threat-roundup\/\">668% increase in attacks on critical infrastructure<\/a>, according to data from Forescout\u2019s research team, Vedere Labs. This isn\u2019t hyperbole. These are the facts from the 19 billion+ devices in our customer data lake.<\/p>\n<p>OT systems power our water treatment plants, energy grids, transportation networks, and so much more. When these systems go down or get compromised, it\u2019s more than an inconvenience. It\u2019s a national emergency.<\/p>\n<p>Recently, CISA and its international partners released the guidance <a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/foundations-ot-cybersecurity-asset-inventory-guidance-owners-and-operators\" target=\"_blank\" rel=\"noopener\">\u201cFoundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators.<\/a>\u201d This document reinforces what I see every day in the field: you can\u2019t protect what you don\u2019t know you have in your environment.<\/p>\n<p>A reliable asset inventory is not just a checkbox exercise. It\u2019s the foundation of an effective operational technology (OT) security strategy. The CISA guidance works across industries but also had input from \u201cworking sessions with organizations in the\u00a0Energy Sector\u00a0and\u00a0Water and Wastewater Sector.\u201d<\/p>\n<p>We\u2019ve designed the <a href=\"\/products\/\">Forescout 4D Platform\u2122<\/a>\u00a0to give organizations continuous visibility and control across their OT, IT, and IoT environments. Our products, including <a href=\"\/products\/eyeinspect\/\">eyeInspect<\/a>, directly address many of the challenges highlighted in CISA\u2019s recommendations. Below are \u00a0five key recommendations that show how the platform helps organizations achieve them.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Big Why: Visibility Doesn\u2019t Equal Security, But You Can\u2019t Have Security Without Visibility<\/h2>\n<p>Here\u2019s the cold hard truth: you can\u2019t defend what you can\u2019t see. That\u2019s why this guidance is so critical. It\u2019s not just about ticking a box, it\u2019s about building a foundation for modern, defensible architecture that keeps OT safe in an evolving threat landscape.<\/p>\n<p>&nbsp;<\/p>\n<h2>Step-by-Step: How to Build Your OT Asset Inventory (And Why Each Step Matters)<\/h2>\n<p>CISA\u2019s guidance lays out a clear five-step roadmap. Here\u2019s what you need to know:<\/p>\n<h3>1. Define Scope &amp; Objectives<\/h3>\n<p>The first step in building an asset inventory is defining scope and governance. Organizations need to agree on which environments, facilities, and systems are in play, and assign clear roles for ownership. Without this structure, inventories quickly become outdated or incomplete. With Forescout, discovery is automated and continuous, ensuring that defined scope is consistently monitored.<\/p>\n<p>Governance is supported through out of the box integrations with Service Management tools and CMDBs, such as ServiceNow, providing a clear system of record. Solutions like Forescout\u2019s eyeInspect create a continuous blanket of visibility, which enables asset owners to identify the specific assets that need to be incorporated in the scope.<\/p>\n<h3>2. Identify Assets &amp; Collect Attributes<\/h3>\n<p>Visibility gaps are one of the biggest risks in OT. Hidden assets &#8211; legacy controllers, unpatched devices, or shadow systems &#8211; can become backdoors for attackers. CISA recommends documenting every asset with attributes such as vendor, firmware, communications, and location.<\/p>\n<p>Forescout eyeInspect excels here by continuously identifying assets across OT environments without disrupting operations. It captures rich context about each device and communicates that data into the broader 4D Platform for enterprise-wide visibility.<\/p>\n<h3>3. Create a Taxonomy<\/h3>\n<p>Structure matters. Group assets by criticality, function, zones, conduits, etc.-think ISA\/IEC 62443 standards. Visualize, validate, review. The Forescout 4D Platform\u2122 provides a robust policy-based classification engine, allowing customers to organize assets into groups based on role, process, or operational function. This taxonomy is the backbone of effective segmentation and policy enforcement and is shared throughout the platform.<\/p>\n<p>Here&#8217;s an example taxonomy:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-108312\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/cisa-blog-ot-taxonomy-diagram.webp\" alt=\"\" width=\"1019\" height=\"618\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/cisa-blog-ot-taxonomy-diagram.webp 1019w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/cisa-blog-ot-taxonomy-diagram-300x182.webp 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/cisa-blog-ot-taxonomy-diagram-768x466.webp 768w\" sizes=\"auto, (max-width: 1019px) 100vw, 1019px\" \/><\/p>\n<p style=\"text-align: center;\"><em><small>Source: National Renewable Energy Laboratory (NREL)<\/small><\/em><\/p>\n<h3>4. Manage &amp; Centralize Data<\/h3>\n<p>CISA emphasizes the importance of managing data quality and lifecycle changes. Pull in vendor manuals, configuration specs, maintenance records-keep everything in a secure, centralized repository. This isn\u2019t just inventory-it\u2019s intelligence. Without ongoing updates, inventories lose value.<\/p>\n<p>The Forescout 4D Platform\u2122 \u00a0integrates with CMDBs to ensure deduplicated, normalized data is available across the enterprise. As assets are added, updated, or retired, Forescout ensures the inventory remains accurate, enabling better planning and fewer surprises during audits or incident response.<\/p>\n<h3>5. Implement Life-Cycle Management<\/h3>\n<p>Assets don\u2019t live forever. Define stages-from acquisition to decommissioning. Plan for maintenance, backups, replacements, retirements. That\u2019s how you keep the inventory alive and useful. An inventory isn\u2019t an end state &#8211; it\u2019s a foundation for stronger defenses. CISA highlights using the inventory to prioritize risk management, vulnerability patching, maintenance, and supply chain planning.<\/p>\n<p>With our platform, organizations can move beyond visibility to action. For example, eyeInspect-detected vulnerabilities and threats can automatically drive response actions, either within the Forescout suite or via integrations with 3rd party solutions. This closes the loop, enabling organizations not only to identify risks but also to defend against them effectively. The inventory can also be utilized to make determinations around device accesses and traffic segmentations.<\/p>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>See exactly how our technology works \u2014 on your own time and on your own terms in this <a href=\"\/ot-security-self-demo-request\/\">self-guided demo<\/a>.<\/h4>\n<\/div>\n<h2>What Comes Next: Turning Inventory into Impact<\/h2>\n<p>CISA doesn\u2019t stop at asset discovery. Their guidance pushes you further into five essential post-inventory actions:<\/p>\n<ol>\n<li><strong>OT Cybersecurity &amp; Risk Management<\/strong><br \/>\nCross-check your inventory with CISA\u2019s KEV Catalog, prioritize security fixes by criticality, and build layers like segmentation, access controls, and monitoring.<\/li>\n<li><strong>Maintenance &amp; Reliability<\/strong><br \/>\nIntegrate asset data with your maintenance plans-spare parts, patch workflows, secure procurement (&#8220;secure by design&#8221;).<\/li>\n<li><strong>Performance Monitoring &amp; Reporting<\/strong><br \/>\nTrack process health (temperature, pressure, flow) and network diagnostics. Report proactively, and make sure someone owns that inventory.<\/li>\n<li><strong>Training &amp; Awareness<\/strong><br \/>\nThis is a shared responsibility. Make sure everyone understands why asset visibility matters and how to use the tools.<\/li>\n<li><strong>Continuous Improvement<\/strong><br \/>\nBuild feedback loops, track changes, audit regularly. Your inventory should evolve-not age.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Bottom Line<\/h2>\n<p>This isn\u2019t just bureaucratic fluff. It\u2019s a survival strategy. CISA\u2019s OT asset inventory guidance arms you with visibility, context, and control. From defining your scope to establishing continuous feedback, each step builds toward a resilient OT environment where security and reliability go hand in hand.<\/p>\n<p>Let\u2019s get started, because if you don\u2019t know what\u2019s on the network, you&#8217;re not managing risk, you\u2019re inviting it.<\/p>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Go deeper: Join a <a href=\"\/webinars\/closing-the-ot-security-gap-visibility-prioritization-and-response\/\">webinar <\/a>with me and Rik Ferguson, Vice President of Security Intelligence: &#8220;Closing the OT Security Gap: Visibility, Prioritization, and Response.&#8221;<\/h4>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.<\/p>\n","protected":false},"author":31,"featured_media":108314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[496],"class_list":["post-108311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Operational Technology Security: Why You Need to Build an Asset Inventory Today<\/title>\n<meta name=\"description\" content=\"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operational Technology Security: Why You Need to Build an Asset Inventory Today\" \/>\n<meta property=\"og:description\" content=\"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-11T10:05:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T11:16:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Shawn Taylor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\"},\"author\":{\"name\":\"Shawn Taylor\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247\"},\"headline\":\"Operational Technology Security: Why You Need to Build an Asset Inventory Today\",\"datePublished\":\"2025-09-11T10:05:09+00:00\",\"dateModified\":\"2025-09-11T11:16:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\"},\"wordCount\":1076,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\",\"name\":\"Operational Technology Security: Why You Need to Build an Asset Inventory Today\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp\",\"datePublished\":\"2025-09-11T10:05:09+00:00\",\"dateModified\":\"2025-09-11T11:16:39+00:00\",\"description\":\"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operational Technology Security: Why You Need to Build an Asset Inventory Today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247\",\"name\":\"Shawn Taylor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/3ccb599f28cf7d28c077f84773b22d35\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g\",\"caption\":\"Shawn Taylor\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Operational Technology Security: Why You Need to Build an Asset Inventory Today","description":"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/","og_locale":"en_US","og_type":"article","og_title":"Operational Technology Security: Why You Need to Build an Asset Inventory Today","og_description":"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.","og_url":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-09-11T10:05:09+00:00","article_modified_time":"2025-09-11T11:16:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","type":"image\/webp"}],"author":"Shawn Taylor","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/"},"author":{"name":"Shawn Taylor","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247"},"headline":"Operational Technology Security: Why You Need to Build an Asset Inventory Today","datePublished":"2025-09-11T10:05:09+00:00","dateModified":"2025-09-11T11:16:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/"},"wordCount":1076,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/","url":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/","name":"Operational Technology Security: Why You Need to Build an Asset Inventory Today","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","datePublished":"2025-09-11T10:05:09+00:00","dateModified":"2025-09-11T11:16:39+00:00","description":"Operational technology security begins with asset inventory and taxonomy. Forescout\u2019s field leader delves into CISA\u2019s latest 2025 guidance.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/operational-technology-security-why-you-need-to-build-an-asset-inventory-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Operational Technology Security: Why You Need to Build an Asset Inventory Today"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247","name":"Shawn Taylor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/3ccb599f28cf7d28c077f84773b22d35","url":"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g","caption":"Shawn Taylor"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Blog-CISA-OT-Asset-Inventory-feature.webp","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=108311"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108311\/revisions"}],"predecessor-version":[{"id":108313,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108311\/revisions\/108313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/108314"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=108311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=108311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=108311"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=108311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}