Distributed Control System (DCS) Controller

A Distributed Control System (DCS) Controller is a microprocessor unit that is used to manage automation processes. DCS Controllers are often found in plants (chemical, manufacturing, oil and gas, etc.) where large scale continuous automation processes are required. A DCS Controller typically operates as part of a larger networked system with other DCS Controllers where each DCS Controller manages an individual part of a continuous process. In addition to these other controllers, DCS Controllers operate along side multiple other system components including system software, operator stations, and other embedded field controllers. The distributed nature of DCS Controllers provides scalability, redundancy, and improved process reliability. DCS Controllers are programmed using traditional process automation programming languages (IEC-61131).

ID: A0017
Platforms: Embedded
Sectors: General
Version: 1.0
Created: 24 September 2025
Last Modified: 21 October 2025

Related Assets

Name Sectors Description
Field Device / Controller General

Distributed Control System (DCS) Controller may be referred to as Field Controllers or Field Devices as a general function name.

Programmable Logic Controller (PLC) General

Programmable Logic Controllers (PLC) share some of the same functionality as DCS Controllers, although often without more advanced control features.

Techniques

Domain ID Name
ICS T0800 Activate Firmware Update Mode
ICS T0830 Adversary-in-the-Middle
ICS T0878 Alarm Suppression
ICS T0802 Automated Collection
ICS T0803 Block Command Message
ICS T0804 Block Reporting Message
ICS T0805 Block Serial COM
ICS T0806 Brute Force I/O
ICS T0892 Change Credential
ICS T0858 Change Operating Mode
ICS T0885 Commonly Used Port
ICS T0884 Connection Proxy
ICS T0809 Data Destruction
ICS T0812 Default Credentials
ICS T0814 Denial of Service
ICS T0868 Detect Operating Mode
ICS T0816 Device Restart/Shutdown
ICS T0871 Execution through API
ICS T0820 Exploitation for Evasion
ICS T0890 Exploitation for Privilege Escalation
ICS T0866 Exploitation of Remote Services
ICS T0822 External Remote Services
ICS T0874 Hooking
ICS T0877 I/O Image
ICS T0872 Indicator Removal on Host
ICS T0835 Manipulate I/O Image
ICS T0838 Modify Alarm Settings
ICS T0821 Modify Controller Tasking
ICS T0836 Modify Parameter
ICS T0889 Modify Program
ICS T0839 Module Firmware
ICS T0801 Monitor Process State
ICS T0834 Native API
ICS T0840 Network Connection Enumeration
ICS T0842 Network Sniffing
ICS T0861 Point & Tag Identification
ICS T0843 Program Download
ICS T0845 Program Upload
ICS T0886 Remote Services
ICS T0846 Remote System Discovery
ICS T0888 Remote System Information Discovery
ICS T0847 Replication Through Removable Media
ICS T0848 Rogue Master
ICS T0851 Rootkit
ICS T0856 Spoof Reporting Message
ICS T0869 Standard Application Layer Protocol
ICS T0862 Supply Chain Compromise
ICS T0857 System Firmware
ICS T0855 Unauthorized Command Message
ICS T0859 Valid Accounts