{"id":29433,"date":"2026-03-18T08:52:59","date_gmt":"2026-03-18T07:52:59","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29433"},"modified":"2026-03-18T08:53:02","modified_gmt":"2026-03-18T07:53:02","slug":"industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/","title":{"rendered":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether.<\/span>\u00a0<br \/><span data-contrast=\"auto\">This is precisely where version\u202f2.0 of the guide\u00a0<\/span><i><span data-contrast=\"auto\">\u201cIndustrial Systems Cybersecurity \u2013 Detailed Measures\u201d<\/span><\/i><span data-contrast=\"auto\">, published on November\u202f27,\u202f2025, positions itself: translating cybersecurity classes into concrete measures, at a time when OT environments must contend with a more acute threat landscape, increasingly interconnected architectures, and more visible compliance requirements.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This guide directly follows the publication of the second version of ANSSI\u2019s\u00a0<\/span><i><span data-contrast=\"auto\">Industrial Systems Classification Method<\/span><\/i><span data-contrast=\"auto\">\u00a0in March\u202f2025, which we had already analyzed in\u00a0a previous\u00a0<\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification\/\"><span data-contrast=\"none\">article<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}\">\u00a0<\/span><\/p>\n<h1>An update built on continuity: the same structure, the same underlying logic<i><\/i><\/h1>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-29423 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en1.png\" alt=\"\" width=\"961\" height=\"420\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en1.png 961w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en1-437x191.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en1-71x31.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en1-768x336.png 768w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/span><\/i><em>Key differences between the first and second versions of the\u00a0detailed measures\u00a0guide\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">In terms of structure, the 2025 guide\u00a0remains\u00a0very close\u00a0to the 2014 version. It opens with a reminder of the constraints and weaknesses specific to industrial environments, followed by a clear separation between organizational and technical measures. The themes themselves will come as no surprise: governance, access control, network segmentation, remote access, backups, supervision, vulnerability management, cybersecurity integration throughout the system lifecycle, and incident preparedness. Continuity is clearly intentional.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This stability has an advantage: organizations already aligned with the 2014 guide do not have to\u00a0start from scratch. At the same time, it also highlights the fact that most of the \u201ccore topics\u201d were already well\u00a0identified\u00a0more than a decade ago. The real question is therefore less \u201cwhat is new?\u201d than \u201cwhat has become more actionable \u2014 and at what cost?\u201d.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On this point, the guide is explicit about its scope.\u00a0It proposes a\u00a0<\/span><b><span data-contrast=\"auto\">minimum baseline<\/span><\/b><span data-contrast=\"auto\">\u00a0intended, among other things, to support security accreditation processes.\u00a0However, it does not claim to replace IEC\u202f62443, nor does it position itself as a certification framework. It simply reuses some of its principles and requirements, while clearly\u00a0stating\u00a0that\u00a0the\u00a0measures\u00a0alone are not sufficient for the most critical systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h1>What has changed in concrete terms\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The most visible change is not the introduction of new topics, but a new way of expressing requirements.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In 2014, the guide relied on a structuring distinction between\u00a0<\/span><b><span data-contrast=\"auto\">recommendations (R)<\/span><\/b><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><b><span data-contrast=\"auto\">directives (D)<\/span><\/b><span data-contrast=\"auto\">, with a hardening mechanism depending on the cybersecurity class. In 2025, this grammar disappears. The guide now introduces a class based reading (C1 to C4) and several variants:<\/span>\u00a0<br \/><span data-contrast=\"auto\">\u2013\u00a0<\/span><i><span data-contrast=\"auto\">state of the art <\/span><\/i><em>recommendations<\/em><span data-contrast=\"auto\">,<\/span>\u00a0<br \/><span data-contrast=\"auto\">\u2013\u00a0<\/span><i><span data-contrast=\"auto\">lower level alternatives<\/span><\/i><span data-contrast=\"auto\">,\u00a0indicated\u00a0by a \u201c\u2013\u201d,<\/span>\u00a0<br \/><span data-contrast=\"auto\">\u2013 and\u00a0<\/span><i><span data-contrast=\"auto\">reinforced complementary recommendations<\/span><\/i><span data-contrast=\"auto\">,\u00a0indicated\u00a0by a \u201c+\u201d.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29419 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en2.png\" alt=\"\" width=\"1392\" height=\"391\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en2.png 1392w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en2-437x123.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en2-71x20.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en2-768x216.png 768w\" sizes=\"auto, (max-width: 1392px) 100vw, 1392px\" \/><\/span><i><span data-contrast=\"auto\">Typical structure of a\u00a0recommendation<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A second major evolution is the explicit introduction of a fourth cybersecurity class and the strengthened alignment with IEC\u202f62443, in line with the updated classification method. For each recommendation,\u00a0a\u00a0correspondence with an IEC\u202f62443 requirement is\u00a0indicated\u00a0when it exists and referenced in a dedicated\u00a0appendix.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to\u00a0Appendix\u202fB,\u00a0a large proportion\u00a0of the 214 recommendations have a direct equivalent in the\u00a0previous\u00a0version. This confirms that\u00a0the overhaul\u00a0is primarily based on reorganization and reformulation rather than a fundamental shift in doctrine. After analyzing the 35 measures identified as having no direct equivalence,\u00a0it appears that they\u00a0are not necessarily new. They typically reflect:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-29435 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1.png\" alt=\"\" width=\"1746\" height=\"627\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1.png 1746w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1-437x157.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1-71x25.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1-768x276.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en5-1-1536x552.png 1536w\" sizes=\"auto, (max-width: 1746px) 100vw, 1746px\" \/><i><span data-contrast=\"auto\">Categories of reasons for no direct equivalence, with illustrated examples<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29415 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3.png\" alt=\"\" width=\"1657\" height=\"814\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3.png 1657w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3-389x191.png 389w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3-768x377.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en3-1536x755.png 1536w\" sizes=\"auto, (max-width: 1657px) 100vw, 1657px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Summary of recommendations with no direct equivalents in Annex B<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<h1>A more architecture-driven doctrine on interconnections and remote access\u00a0<\/h1>\n<p><span data-contrast=\"auto\">Where the 2025 version truly\u00a0changes\u00a0the dynamic is in certain topics that are handled in a more structured way. In the first version, the doctrine on interconnections and remote access was already relatively prescriptive: it emphasized that remote management greatly increases the attack surface, set out operational rules, and even went as far as banning remote maintenance in class 3, using a logic of one-way (unidirectional) data flows.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The modernization brought by the 2025 version makes the whole set more coherent and better structured: it moves from a reasoning mainly centered on components and means (firewalls, VLANs, data diodes, VPNs) to an interpretation in terms of security functions that must be combined and positioned according to the classes and the flow directions in Table 3. The rows of the latter correspond to the issuing class (\u201cfrom\u201d) and the columns to the receiving class (\u201cto\u201d); the icons indicate the security functions to implement in order to authorize the flow in that direction. For example, from class C1 to IT, only a system that can verify whether the data comes from an authorized source\u2014Aut(IT)\u2014is required.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29411 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en4.png\" alt=\"\" width=\"1018\" height=\"789\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en4.png 1018w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en4-246x191.png 246w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en4-50x39.png 50w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/anssi2_en4-768x595.png 768w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Summary of Table 3 \u2013 Section 4.2.1: all listed measures are associated with a data transfer <\/span><\/i><b><i><span data-contrast=\"auto\">unidirectionality<\/span><\/i><\/b><i><span data-contrast=\"auto\">\u00a0function<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It should be noted, however, that the definition of\u00a0<\/span><i><span data-contrast=\"auto\">Inno (OT)<\/span><\/i><span data-contrast=\"auto\">\u00a0is not explicitly provided in the document.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h1>From framework to on-the-ground implementation\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The 2025 version of the Detailed Measures logically\u00a0brings to a close\u00a0the overhaul\u00a0initiated\u00a0with the publication of the second version of the classification method, and it strengthens compatibility with IEC 62443. In a context where the threat to industrial environments is now highly visible, this document comes at just the right time:\u00a0it\u2019s\u00a0an opportunity to adjust your action plan\u2014or even to launch a full 2030 roadmap. A guide that\u00a0isn\u2019t\u00a0put into practice has never stopped an attacker!<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Among the priority workstreams that are regularly\u00a0identified, we often see:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Revisit the IT mapping and the business\u2019s dependencies on IT<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Adapt the technical architecture by trading \u201cnew authorizations\u201d for stronger authentication and better content control<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Harden and centralize remote access, especially given the many suppliers present in industrial environments<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Strengthen industrial environments or connect them to your SOC<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether.\u00a0This is precisely where version\u202f2.0 of the guide\u00a0\u201cIndustrial Systems Cybersecurity \u2013 Detailed Measures\u201d, published on November\u202f27,\u202f2025, positions itself: translating cybersecurity classes into&#8230;<\/p>\n","protected":false},"author":1347,"featured_media":29444,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3275,3274],"tags":[],"coauthors":[3141,4664,4663],"class_list":["post-29433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-iot-consumer-goods-en","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether.\u00a0This is precisely where version\u202f2.0 of the guide\u00a0\u201cIndustrial Systems Cybersecurity \u2013 Detailed Measures\u201d, published on November\u202f27,\u202f2025, positions itself: translating cybersecurity classes into...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-18T07:52:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T07:53:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-trushotz-2012836-3635300-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lo\u00efc Lebain, Nicolas ZUDDAS, Solveig BERLING\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lo\u00efc Lebain, Nicolas ZUDDAS, Solveig BERLING\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\"},\"author\":{\"name\":\"Lo\u00efc Lebain\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\"},\"headline\":\"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0\",\"datePublished\":\"2026-03-18T07:52:59+00:00\",\"dateModified\":\"2026-03-18T07:53:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\"},\"wordCount\":903,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"IoT &amp; Consumer goods\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\",\"name\":\"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg\",\"datePublished\":\"2026-03-18T07:52:59+00:00\",\"dateModified\":\"2026-03-18T07:53:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\",\"name\":\"Lo\u00efc Lebain\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/","og_locale":"en_US","og_type":"article","og_title":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight","og_description":"Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether.\u00a0This is precisely where version\u202f2.0 of the guide\u00a0\u201cIndustrial Systems Cybersecurity \u2013 Detailed Measures\u201d, published on November\u202f27,\u202f2025, positions itself: translating cybersecurity classes into...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/","og_site_name":"RiskInsight","article_published_time":"2026-03-18T07:52:59+00:00","article_modified_time":"2026-03-18T07:53:02+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-trushotz-2012836-3635300-scaled.jpg","type":"image\/jpeg"}],"author":"Lo\u00efc Lebain, Nicolas ZUDDAS, Solveig BERLING","twitter_misc":{"Written by":"Lo\u00efc Lebain, Nicolas ZUDDAS, Solveig BERLING","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/"},"author":{"name":"Lo\u00efc Lebain","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c"},"headline":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0","datePublished":"2026-03-18T07:52:59+00:00","dateModified":"2026-03-18T07:53:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/"},"wordCount":903,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","IoT &amp; Consumer goods","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/","name":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg","datePublished":"2026-03-18T07:52:59+00:00","dateModified":"2026-03-18T07:53:02+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/pexels-pixabay-459728.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/03\/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Industrial cybersecurity: the ANSSI \u201cDetailed Measures\u201d guide overhaul\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c","name":"Lo\u00efc Lebain","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1347"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29433"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29433\/revisions"}],"predecessor-version":[{"id":29445,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29433\/revisions\/29445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29444"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29433"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}