Safety Controller

Safety controllers are typically a type of field device used to perform the safety critical function. Safety controllers often support the deployment of custom programs/logic, similar to a PLC, but can also be tailored for sector specific functions/applications. The safety controllers typically utilize redundant hardware and processors to ensure they operate reliably if a component fails.

ID: A0010
Platforms: Embedded
Sectors: General
Version: 1.1
Created: 28 September 2023
Last Modified: 12 May 2026

Related Assets

Name Sectors Description
Safety Instrumented System (SIS) controller General

SIS controllers are used to "take the process to a safe state when predetermined conditions are violated" [1] through the reading of sensor data and interaction with digital/physical control surfaces. These devices are oftentimes located on programmable embedded devices running specialized RTOS or other embedded operating systems.

Emergency Shutdown Systems (ESD) controller General

Emergency Shutdown System controllers are used to read sensor values and interact with control surfaces to return the system "to a safe static condition so that any remedial action can be taken". [2]

Burner Management Systems (BMS) controller General

Burner Management System controllers are used to interact with sensors and control surfaces to maintain safe operating conditions for the burner. These can include safely starting-up and managing the main flame, controlling and monitoring the burning conditions, and safely initiating planned or unplanned shutdown sequences.

Techniques

Domain ID Name
ICS T0800 Activate Firmware Update Mode
ICS T0830 Adversary-in-the-Middle
ICS T0878 Alarm Suppression
ICS T1695 Block Communications
.001 Serial COM
.002 Ethernet
.003 Wi-Fi
ICS T1691 Block Operational Technology Message
.001 Command Message
.002 Reporting Message
ICS T0806 Brute Force I/O
ICS T0892 Change Credential
ICS T0858 Change Operating Mode
ICS T0885 Commonly Used Port
ICS T0884 Connection Proxy
ICS T0809 Data Destruction
ICS T0814 Denial of Service
ICS T0868 Detect Operating Mode
ICS T0816 Device Restart/Shutdown
ICS T0871 Execution through API
ICS T0820 Exploitation for Evasion
ICS T0890 Exploitation for Privilege Escalation
ICS T0866 Exploitation of Remote Services
ICS T0874 Hooking
ICS T0877 I/O Image
ICS T0872 Indicator Removal on Host
ICS T1694 Insecure Credentials
.001 Default Credentials
ICS T0835 Manipulate I/O Image
ICS T0838 Modify Alarm Settings
ICS T0821 Modify Controller Tasking
ICS T1693 Modify Firmware
.001 System Firmware
.002 Module Firmware
ICS T0889 Modify Program
ICS T0801 Monitor Process State
ICS T0834 Native API
ICS T0840 Network Connection Enumeration
ICS T0842 Network Sniffing
ICS T0861 Point & Tag Identification
ICS T0843 Program Download
.001 Download All
.002 Online Edit
.003 Program Append
ICS T0845 Program Upload
ICS T0846 Remote System Discovery
.001 Port Scan
.002 Broadcast Discovery
.003 Multicast Discovery
ICS T0888 Remote System Information Discovery
ICS T0847 Replication Through Removable Media
ICS T0848 Rogue Master
ICS T0851 Rootkit
ICS T0881 Service Stop
ICS T0869 Standard Application Layer Protocol
ICS T0862 Supply Chain Compromise
ICS T1692 Unauthorized Message
.001 Command Message
.002 Reporting Message
ICS T0859 Valid Accounts

References