🎉 CISA CPG 2.0 Toolkit

Meet CISA Cybersecurity Performance Goals with
AI-Powered ICS/OT Tabletop Exercises

CISA's Cybersecurity Performance Goals (CPG 2.0) define 38 cross-sector foundational cybersecurity practices for critical infrastructure operators — aligned to NIST CSF 2.0's six functions: Govern, Identify, Protect, Detect, Respond, and Recover. CyberICS maps 335+ ready-to-run OT/ICS tabletop scenarios to specific CPG goal IDs, generating audit-ready evidence packages that demonstrate goal achievement across Energy, Water, Manufacturing, and 21 more sectors.

CPG 2.X — Test the Response Plan (Tabletop Exercises)
CPG 2.V-2.W — IR Plans & Annual Review
CPG 1.A-1.B — Asset Inventory & Network Topology
CPG 2.S — IT/OT Network Segmentation
EN / FR / PT / ES / DE / IT — Multi-Language
Start Free — 3 Exercises Included Talk to Our CISA CPG Team
Compliance Note: CyberICS tabletop exercise evidence directly supports CPG 2.X (Test the Response Plan) and contributes documented evidence toward CPG 2.V (IR Plans), CPG 2.W (Plan Review), CPG 4.A (Incident Planning), and CPG 1.A (Asset Inventory). Formal CISA CPG self-attestation and sector-specific compliance determination requires engagement with your sector risk management agency (SRMA) and qualified legal counsel.
Who NIS2 Applies To

Essential Entities vs. Important Entities

NIS2 expands significantly on NIS1, covering 11 essential sectors and 7 important sectors. Both categories must implement Article 21 measures — including documented incident handling and crisis management testing.

Essential Entities

Higher Scrutiny, Proactive Supervision

Essential entities are subject to proactive supervision by national competent authorities, stricter incident reporting timelines (24hr early warning / 72hr notification / 1-month final report), and potential sanctions of up to €10M or 2% of global annual turnover.

  • Energy (electricity, oil, gas, hydrogen)
  • Transport (air, rail, water, road)
  • Banking & Financial Market Infrastructure
  • Health (hospitals, labs, pharma manufacturers)
  • Drinking water & wastewater
  • Digital infrastructure (IXPs, DNS, TLD, cloud, data centres)
  • ICT service management (managed services)
  • Public administration (central government)
  • Space (ground infrastructure operators)
Tabletop exercises directly evidence Art. 21(b) incident handling and Art. 21(c) business continuity testing obligations for Essential Entities.
Important Entities

Reactive Supervision, Same Measures

Important entities face reactive (complaint-driven) supervision and lower penalty caps (up to €7M or 1.4% of global turnover), but must implement the same Article 21 cybersecurity risk management measures as Essential Entities.

  • Postal & courier services
  • Waste management
  • Chemicals (manufacture, production, distribution)
  • Food (large-scale production & distribution)
  • Manufacturing (medical devices, electronics, machinery, motor vehicles)
  • Digital providers (online marketplaces, search engines, social platforms)
  • Research organisations
Same Article 21 technical and operational measures apply. Exercise documentation requirements are identical.
🌎

Multilingual Support for EU Teams

The NIS2 Directive applies across 27 Member States in multiple working languages. CyberICS delivers exercises, AI facilitation outputs, and After Action Reports in Multi-Language — enabling cross-border and multilingual teams to run exercises in their working language.

🇬🇧 English 🇫🇷 Français 🇵🇹 Português 🇪🇸 Español 🇩🇪 Deutsch 🇮🇹 Italiano
Article 21 Mapping

NIS2 Article 21 — Cybersecurity Risk Management Measures

Article 21 defines ten mandatory cybersecurity measures for all covered entities. Tabletop exercises directly satisfy (b) and (c), and support evidence generation for six additional measures.

Article 21 Requirements Reference

Coverage: Core = exercise directly required  |  Supporting = exercise validates / documents  |  Partial = scenario content covers the risk domain

Article Measure Requirement Summary CyberICS Capability Coverage
Art. 21(a) Risk analysis & IS policies Policies on information security risk analysis and information system security AI Facilitator Briefing surfaces policy gaps; AAR documents policy weaknesses identified during exercises; Gap Analysis flags absent policies Supporting
Art. 21(b) Incident handling Procedures for incident detection, analysis, containment, and recovery. Documented testing of incident response plans Live Session mode executes structured incident response exercises. AI AAR documents detection, containment, and recovery steps taken. Compliance evidence package provides audit-ready incident handling test record Core
Art. 21(c) Business continuity & crisis management Backup management, disaster recovery, and crisis management plans — including documented testing Recovery-focused scenario variants test backup activation and DR procedures; Crisis management steps are recorded and reflected in the AAR; Compliance evidence package documents the crisis management exercise Core
Art. 21(d) Supply chain security Security of supply chain relationships, including vendor risk assessment and contractual security requirements Supply chain attack scenarios exercise third-party compromise detection and vendor communication procedures; Gap Analysis flags supply chain vulnerabilities identified during exercise Partial
Art. 21(e) Network & IS security Security in network and information systems acquisition, development, and maintenance Network-layer attack scenarios (lateral movement, OT/IT boundary crossing) exercise detection and response; AAR documents control gaps in network security posture Partial
Art. 21(f) Cyber hygiene & training Policies and procedures for evaluating effectiveness of measures, including basic cyber hygiene and cybersecurity training Exercise completion demonstrates active cybersecurity training activity; Facilitator Certification (CTEP) evidence of qualified facilitation; AI Coaching tips reinforce hygiene practices during exercises Supporting
Art. 21(g) Cryptography policies Policies on the use of cryptography and encryption Scenarios referencing encrypted communication channels and data-at-rest protections exercise cryptography-adjacent procedures; limited direct coverage Partial
Art. 21(h) Human resources security & access control HR security policies, access control, asset management Insider threat and privilege escalation scenarios exercise access control response procedures; AAR flags access management gaps identified during exercises Supporting
Art. 21(i) Multi-factor authentication Use of MFA or continuous authentication for access to network and information systems Authentication bypass scenarios test detection of MFA circumvention; limited direct coverage of MFA policy enforcement Partial
Art. 20 Governance — Management oversight Management bodies must approve cybersecurity risk management measures, oversee their implementation, and attend cybersecurity training Executive-level scenario participants, AI AAR addressed to management, exercise history demonstrating consistent programme, Compliance Dashboard for board-level reporting Supporting
Platform Capabilities

How CyberICS Supports Your NIS2 Programme

Three core capabilities work together to deliver, document, and evidence your Article 21(b) and 21(c) obligations.

🎲
Article 21(b) · 21(c)

Structured Exercise Execution

Live Session mode provides a real-time, multi-participant exercise environment. All steps, responses, and host actions are timestamped — creating an auditable record of your incident handling test.

  • Participant join record with timestamps
  • Step-by-step scenario walkthrough log
  • Session duration and completion metadata
  • Scored participant responses (optional)
📋
Article 21(b) · 21(c) · 20

AI-Generated After Action Report

Immediately after each exercise, CyberICS's AI generates a structured AAR documenting gaps, recommendations, and NIS2 Article 21 control references — in the language your team worked in.

  • Structured gap analysis with severity ratings
  • NIS2 Article 21 control references per gap
  • Corrective action recommendations
  • Multilingual output (EN/FR/PT/ES/DE/IT)
📄
All Article 21 Measures

Compliance Evidence Package

The Compliance Dashboard generates per-framework NIS2 evidence packages — a 6-page audit PDF covering exercise log, Article 21 controls coverage, gap analysis, remediation plan, and attestation.

  • Exercise date, scope, and participants record
  • NIS2 Article 21 controls coverage map
  • Identified gaps and remediation timeline
  • Attestation page for competent authority files
Scenario Library

NIS2-Relevant Scenarios Across Essential & Important Sectors

Six high-fidelity scenarios covering the most regulated NIS2 sectors — ready to run without customisation, with AI facilitator briefing included.

Healthcare & Hospitals
Essential Entity
Hospital BMS Ransomware Attack

Ransomware propagates through a hospital's Building Management System, affecting HVAC, access control, and medical gas pressure monitoring. Tests Art. 21(b)(c) incident and continuity response.

Art. 21(b) Art. 21(c) Art. 21(d)
Energy — Electricity
Essential Entity
Power Grid Cascading Failure

A coordinated cyberattack targets multiple substations simultaneously, triggering cascading grid failures. Exercises Art. 21(b) incident response and cross-authority communication under Art. 23.

Art. 21(b) Art. 23 Art. 21(c)
Water & Wastewater
Essential Entity
Water Treatment SCADA Intrusion

An attacker gains access to a municipal water treatment SCADA system and begins altering chemical dosing setpoints. Tests detection, containment, and public authority notification under NIS2 Art. 23.

Art. 21(b) Art. 23 Art. 21(e)
Banking & Finance
Essential Entity
Banking SWIFT Network Disruption

A sophisticated threat actor compromises SWIFT messaging infrastructure, threatening transaction integrity and regulatory notification timelines. Exercises DORA/NIS2 dual obligations and Art. 21(b) response.

Art. 21(b) DORA Art. 23
Transport & Logistics
Important Entity
Port Logistics Platform Disruption

Ransomware strikes a port's logistics management platform, halting container tracking and creating cross-border supply chain disruption. Tests Art. 21(b)(c) and supply chain notification obligations.

Art. 21(b) Art. 21(d) Art. 21(c)
Multi-Sector
Essential & Important
Cross-Border Supply Chain Attack

A trusted software vendor used across multiple EU Member State entities is compromised, requiring coordinated cross-border response. Tests Art. 21(d) supply chain obligations and Art. 23 notification flows.

Art. 21(d) Art. 23 Art. 21(b)

Plus 59 additional scenarios across Pharma, Chemical, Manufacturing, Oil & Gas, and more. Browse the full library →

Evidence Artifacts

Audit-Ready Documentation for Competent Authorities

Every CyberICS exercise generates four categories of compliance evidence supporting NIS2 Article 21 demonstration requirements and competent authority reporting.

📋
After Action Report (AAR)

AI-generated PDF with gap analysis, corrective actions, and NIS2 Article 21 references. Available in EN, FR, PT, ES within minutes of exercise completion.

Art. 21(b) · Art. 21(c)
📈
NIS2 Evidence Package

6-page per-framework audit PDF: exercise log, Article 21 controls map, gap analysis, remediation timeline, and attestation page for competent authority files.

All Article 21 Measures
🕑
Session Activity Transcript

Timestamped record of all participant responses and exercise activity demonstrating real team engagement — relevant to Art. 20 management participation evidence.

Art. 20 Governance
🔗
Gap Remediation Tracking

Identified exercise gaps are automatically pushed to ServiceNow or Jira as remediation tickets — creating a documented corrective action trail for Article 21 implementation evidence.

Art. 21 Implementation
CPG 2.0 Goal Reference

38 Cross-Sector Cybersecurity Performance Goals

CISA CPG 1.0.1 defines 38 foundational goals across five NIST CSF functions. CPG 2.0 (Dec 2024) reorganizes these under six functions — adding GOVERN — and consolidates IT/OT goals into universal standards. CyberICS scenarios map directly to specific CPG goal IDs.

IDENTIFY Goals 1.A – 1.H (1.I removed in CPG 2.0)
1.A — Asset InventoryMaintain an up-to-date inventory of all hardware and software assets across IT and OT environments.
1.B — Network Topology MapsEstablish and maintain accurate network diagrams including IT/OT interconnections and remote access paths.
1.C — Basic Cybersecurity PoliciesDevelop, document, and implement foundational cybersecurity policies and acceptable use procedures.
1.D — Account ManagementEstablish processes to manage and track user accounts across all systems and lifecycle stages.
1.E — Privileged Account ManagementIdentify and control all privileged accounts; enforce least-privilege access across OT and IT systems.
1.F — Vulnerability Management ProgramEstablish a program to discover, prioritize, and track remediation of known vulnerabilities.
1.G — Unsanctioned IT/OT DiscoveryDiscover and remediate unsanctioned assets and shadow IT/OT infrastructure on the network.
1.H — Vulnerability Disclosure PolicyEstablish a coordinated vulnerability disclosure program to receive and act on security reports.
PROTECT Goals 2.A – 2.X (24 goals)
2.A — Software Version ManagementMaintain up-to-date software across IT and OT environments; track EOL systems.
2.B — Timely Vulnerability RemediationRemediate known exploited vulnerabilities (CISA KEV) within defined timeframes.
2.C — Unique CredentialsEnforce unique credentials for every user account; prohibit shared or default passwords.
2.D — Revoke Departing CredentialsRemove all access for terminated or departing staff within 24 hours of separation.
2.E — Separate User & Privileged AccountsSegregate standard user accounts from administrative/privileged accounts for all staff.
2.F — Access Management ProgramManage access rights systematically; enforce least-privilege and need-to-know principles.
2.G — Revoke Unnecessary AccessImmediately revoke access when no longer required; perform periodic access reviews.
2.H — Multifactor Authentication (MFA) ⭐Implement MFA for all remote access, VPN, and administrative account access.
2.I — Preventative Email MeasuresDisable malicious email macros; block dangerous file types; configure email filtering.
2.J — Encrypt Data at RestEncrypt sensitive data on devices, servers, and removable media at rest.
2.K — Strong Encryption in TransitEncrypt all data in transit using strong protocols (TLS 1.2+); disable weak ciphers.
2.L — Email Security (DMARC/DKIM/SPF)Implement DMARC, DKIM, and SPF email authentication to prevent domain spoofing.
2.M — Device SecuritySecure all devices including OT/ICS endpoints; enforce physical and logical controls.
2.N — Web Browser SecurityConfigure browsers securely; enforce automatic updates; restrict risky browser extensions.
2.O — Anti-Phishing TrainingConduct regular phishing simulation exercises and cybersecurity awareness training for all staff.
2.P — Endpoint ProtectionDeploy and maintain endpoint detection and response (EDR/AV) solutions on all endpoints.
2.Q — Offline / Immutable BackupsMaintain offline or immutable backups of all critical systems and OT configuration data.
2.R — Encrypt BackupsEncrypt all backup data; test restoration regularly to verify backup integrity.
2.S — Network Segmentation (IT/OT) ⭐Implement network segmentation; isolate OT networks from corporate IT; control all IT/OT interconnections.
2.T — Log CollectionEnable and collect security event logs from all critical IT and OT systems.
2.U — Centralized Log ManagementAggregate logs centrally and retain for a minimum of 6 months to support incident investigation.
2.V — Incident Response PlansDocument comprehensive incident response procedures covering OT and IT environments.
2.W — Response Plan ReviewReview and update incident response plans at least annually and after every significant incident.
2.X — Test the Response Plan ⭐Conduct tabletop exercises or functional simulations to test response plans at least annually. → Direct CyberICS deliverable.
DETECT
3.A — Detect & Respond to Threats Removed in CPG 2.0Detect and respond to relevant threats and TTPs. Merged into Protect and Respond goals in CPG 2.0.
RESPOND
4.A — Incident Planning & PreparednessMaintain documented incident response procedures; assign roles and responsibilities.
4.B — Notify Relevant PartiesReport incidents to CISA, FBI, and sector regulators within required timeframes.
4.C — Mitigate Cyber IncidentsContain incidents and restore operations swiftly; limit propagation and impact.
RECOVER
5.A — Recovery PlanningEstablish and document recovery plans for all critical systems and OT processes; test recovery procedures.
⭐ = Priority goals where CyberICS tabletop exercises directly generate compliance evidence.  |  CPG 2.0 adds a new GOVERN function (leadership accountability, MSP risk management) and reorganizes all 38 goals under 6 NIST CSF 2.0 functions. Goal IDs above follow the CPG 1.0.1 numbering scheme in common industry use.

Explore the Full Regulatory Toolkit Library

CyberICS exercise evidence maps to multiple frameworks simultaneously. One exercise program — complete regulatory coverage.

Ready to Exercise Your CISA CPG Response Plans?

Start with 3 free exercises — no credit card required. Or speak with our team about building a structured CPG exercise programme mapped to your sector's specific goals.

Also explore: CISA CTEP Toolkit  ·  NIST CSF 2.0 Toolkit  ·  NERC CIP Toolkit