WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships The CWE Top 25 and ICS Coding
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

The CWE Top 25 and ICS Coding

Author: Jennifer Walker

Created: Thursday, July 22, 2021 - 17:21

Categories: Cybersecurity, OT-ICS Security

The Homeland Security Systems Engineering and Development Institute, sponsored by the Department of Homeland Security and operated by MITRE, has released the 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list. At first blush, this list may seem more relevant to the IT/business applications side of your utility – and you aren’t wrong. This annual list represents the top, easy to find, exploitable weaknesses that enable threat actors to compromise a system, steal data, or prevent an application from working. The CWE Top 25 is updated each year to enumerate the most common and current security weaknesses. By reviewing this list, developers, programmers, testers, security researchers, educators, and users can gain appreciation and understanding for some of the substandard coding practices that plague our applications and systems.

However, don’t overlook the CWE list when assessing ICS coding practices. As a matter of fact, the newly released Top 20 Secure PLC Coding Practices was partially inspired by and maps to/references CWEs at least twenty times. Vivek Ponnada, one of the co-organizers of the PLC Top 20 project, shares more on the relevance of PLC coding and CWEs and how the reference is perfect for what the PLC Top 20 list is trying to achieve. Review the newly released 2021 CWE Top 25 at MITRE.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar