MCP server for OT (Operational Technology) security standards and frameworks
npm install @ansvar/ot-security-mcpIEC 62443 for the AI age.







Query IEC 62443, NIST 800-82, NIST 800-53, and MITRE ATT&CK for ICS — the complete OT security framework stack — directly from Claude, Cursor, or any MCP-compatible client.
If you're securing industrial control systems, manufacturing plants, energy infrastructure, or critical OT environments, this is your security standards reference.
Built by Ansvar Systems — Stockholm, Sweden
---
OT security standards are scattered across ISA PDFs, NIST publications, and MITRE matrices. Whether you're:
- A control systems engineer implementing IEC 62443 security levels
- A security architect designing network segmentation with the Purdue Model
- A compliance officer mapping NIS2 requirements to IEC controls
- A threat hunter investigating MITRE ATT&CK for ICS techniques
- A product team building secure PLCs, SCADA systems, or industrial IoT devices
...you shouldn't need to juggle 6 different documentation sites and 200 pages of standards. Ask Claude. Get the exact requirement. With context.
This MCP server makes OT security standards searchable, cross-referenceable, and AI-readable.
---
``bash`
npm install @ansvar/ot-security-mcp
Add to your claude_desktop_config.json:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.json
Windows:
`json`
{
"mcpServers": {
"ot-security": {
"command": "npx",
"args": ["-y", "@ansvar/ot-security-mcp"]
}
}
}
Restart Claude Desktop. Done.
`json`
{
"mcp.servers": {
"ot-security": {
"command": "npx",
"args": ["-y", "@ansvar/ot-security-mcp"]
}
}
}
---
Once connected, just ask naturally:
More examples: See docs/use-cases.md for industry-specific scenarios
---
Detailed coverage: docs/coverage.md
Use cases by industry: docs/use-cases.md
Available tools: docs/tools.md
---
Authoritative Source Data:
- IEC 62443: User-supplied (licensed standards) — you provide your own licensed data
- NIST 800-53: Automated OSCAL ingestion from official NIST GitHub
- NIST 800-82: Curated guidance from official PDF publication
- MITRE ATT&CK: Automated STIX 2.0 ingestion from official MITRE repository
- All data stored in SQLite with full-text search (FTS5)
Smart Architecture:
- Security level filtering uses junction tables (many-to-many relationships)
- Zone/conduit guidance generates markdown with Purdue Model context
- Requirement rationale includes regulatory drivers and related standards
- Cross-standard mappings use confidence scores for quality assessment
Technical Stack:
``
Official Source → Parse → Validate → SQLite → MCP Tools → AI Response
↑ ↑ ↑
OSCAL/STIX JSON Schema FTS5 Search
| Traditional Approach | This MCP Server |
|---------------------|-----------------|
| Buy IEC 62443 PDFs ($500+) | Ingest your licensed IEC data once |
| Navigate 300+ page security level tables | "What requirements apply to SL-2?" → instant answer |
| Manual Purdue Model diagrams | get_zone_conduit_guidance → generated architecture |compare_ot_requirements
| Cross-reference NIST ↔ IEC manually | → mapped instantly |
| Search MITRE matrices by hand | "Show me PLC attacks" → filtered techniques |
| 6 different documentation sites | One unified query interface |
Traditional example: Open IEC 62443-3-3 PDF → Find security level table → Ctrl+F "SR 1" → Read 15 pages → Cross-reference to IEC 62443-4-2 → Repeat for NIST
This MCP: "What are all IEC 62443 requirements for Security Level 2 targeting embedded devices?" → Done.
---
> 📄 IEC 62443 CONTENT NOT INCLUDED
>
> IEC 62443 is a copyrighted standard published by the International Society of Automation (ISA) and International Electrotechnical Commission (IEC).
>
> This MCP server provides:
> - Database schema and ingestion tools for IEC 62443 data
> - JSON templates showing the expected data structure
> - Sample data (2 requirements) demonstrating the format
>
> You must provide:
> - Your own licensed copies of IEC 62443 standards
> - Your own JSON files created from your licensed standards
>
> How to obtain IEC 62443 standards:
> - Purchase from ISA or IEC
> - Prices: ~$150-200 per part (3-3, 4-2, 3-2)
>
> Ingestion guide: See docs/ingestion/iec62443-guide.md
> 🚨 THIS TOOL IS NOT SECURITY CONSULTING OR LEGAL ADVICE 🚨
>
> Security requirements are sourced from official public standards (NIST, MITRE) and user-supplied licensed standards (IEC 62443). However:
> - Security level targeting is risk-based and requires proper threat modeling
> - Zone/conduit architectures are design aids, not prescriptive solutions
> - Cross-standard mappings are interpretive aids, not official guidance
> - MITRE techniques are threat intelligence, not vulnerability assessments
>
> Always:
> - Conduct proper risk assessments for your specific environment
> - Engage qualified OT security professionals for implementation guidance
> - Verify against official standard publications
> - Follow your organization's security policies and procedures
Public domain content — NIST 800-53, NIST 800-82, and MITRE ATT&CK for ICS data are sourced from official U.S. government repositories and are in the public domain. No restrictions on use or distribution.
---
This server is part of Ansvar's MCP ecosystem for industrial and enterprise security:
$3
Query 1,451 security controls across 28 IT/OT frameworks
- ISO 27001, NIST CSF, DORA, PCI DSS, SOC 2, CMMC, and 22 more
- Bidirectional framework mapping and gap analysis
- Works with OT Security MCP for complete IT/OT coverage
- Install: pipx install security-controls-mcp$3
Query 47 EU regulations including NIS2 and Cyber Resilience Act
- GDPR, AI Act, DORA, NIS2, MDR, CRA, and 41 more
- Critical for EU OT operators under NIS2 directive
- Install: npx @ansvar/eu-regulations-mcp$3
Query US compliance laws including TSA Pipeline Security
- HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, and 9 more
- Relevant for US critical infrastructure operators
- Install: npm install @ansvar/us-regulations-mcp$3
Complete OT compliance workflow:
`
1. "What are NIS2 requirements for energy sector OT systems?"
→ EU Regulations MCP returns NIS2 Article 21 requirements2. "What IEC 62443 security level satisfies NIS2 Article 21?"
→ OT Security MCP recommends Security Level 2-3 based on risk assessment
3. "Map IEC 62443-4-2 SR 1.1 to NIST 800-53 controls"
→ Security Controls MCP shows bidirectional mapping to AC-2, IA-2, etc.
4. "What MITRE ATT&CK techniques target this configuration?"
→ OT Security MCP shows relevant ICS attack techniques and mitigations
``Stack these servers for:
- EU OT operators (NIS2 + IEC 62443 + ISO 27001)
- US critical infrastructure (NIST + IEC 62443 + sector-specific regulations)
- Global manufacturers (All compliance + OT security + framework mapping)
---
We build AI-accelerated threat modeling and compliance tools for automotive OEMs, Tier 1 suppliers, industrial manufacturers, and critical infrastructure operators. This MCP server started as our internal IEC 62443 reference tool — turns out everyone securing OT environments has the same "6 documentation sites, 12 PDFs" problem.
So we're open-sourcing it. Navigating IEC 62443 security levels shouldn't require a spreadsheet and a law degree.
ansvar.eu — Stockholm, Sweden
Industries we serve:
- Automotive (ISO 21434, UN R155)
- Industrial Manufacturing (IEC 62443)
- Energy & Utilities (NERC CIP, IEC 62443)
- Medical Devices (IEC 81001-5-1, IEC 62443-4-2)
---
---
See: ROADMAP.md for full feature timeline
---
We welcome contributions! See CONTRIBUTING.md for:
- Adding new standards
- Improving cross-standard mappings
- Enhancing tool capabilities
- Fixing bugs or improving documentation
---
Code: Apache License 2.0 (see LICENSE)
Data:
- IEC 62443: User-supplied (requires license from ISA/IEC)
- NIST 800-53, 800-82: Public domain (U.S. government work)
- MITRE ATT&CK for ICS: Apache 2.0 (MITRE Corporation)
---
Contact: info@ansvar.eu
---
Built with care in Stockholm, Sweden