Summary
In this chapter, we took a deep dive into the IDMZ. We looked at how a typical IDMZ is set up and configured; we discussed fundamental concepts such as broker services; and we saw how over time the IDMZ has expanded to cover all zones of the ICS environment. Finally, we looked at some typical broker-service scenarios and how they would manifest as IDMZ implementations.
This chapter concludes the first edition review and update part of the book. In the next chapter, we will start discussing the main topic of this second edition: security monitoring. We start this journey into security monitoring with a discussion around security-minded ICS architecture design.