The vulnerabilities left in the equipment provide potential opportunities for malicious threat actors to compromise the equipment, lead to interruptions in manufacturing. Semi.org released E187 standard which defines the specifications for Cyber Security of Fab Equipment. This paper talks about the assessment of equipment for E187 compliance, while defining a mechanism for E187 compliance score card. The assessment of Equipment for E187 compliance comprises of four major items. a. Assessment of Operating System Security: Center for Internet Security (CIS) released a set of requirements and benchmarking for operating system hardening. This covers access controls, user rights management, services, audit policy configurations, firewall, event log service, administrative templates, windows defender antivirus, windows remote management (WinRM), start menu and taskbar. These requirements are considered for assessing the hardening of operating system. b. Assessment of Network Security: There are requirements to harden system and its networks to reduce the attack surfaces for the malware, which include gateway, network security management, patch management, harden network devices, out- of- band management, securing FTP and SFTP servers, network configuration management, malware protection, user account management, email and internet access, IT policy and security. These requirements are considered for assessing the network security. c. Equipment Monitoring: Equipment can be enabled for continuous monitoring with logs files. For example, audit logs, WMI Logs, applications logs and access control logs. These logs are analyzed to identify any malicious behavior like brute forcing, suspicious commands etc. d. Malware Scanning: Industry-standard malware tools are used to completely scan the equipment assets to ensure there is no malware present. Around 700 security requirements were identified for hardening OS, network and monitoring. These requirements are prioritized as P1, P2, P3. Based on the number of requirements adhered by the equipment, priority of those requirements and presence of malware, a score will be arrived for E187 compliance. The assessment will provide the gaps in E187 compliance along with necessary recommendations to fix them. Iterative assessments will make equipment complaint to E187 standards.