Summary
In this chapter, we discussed what designing for security entails. We also discussed how applying the concept on the ICS environment will result in a well-defined, defendable, and expandable overall ICS network architecture design. We saw how such a network design will allow us to easily extend and expand our security features and controls, with the aim of ultimately implementing security monitoring.
In the next chapter, we are going to be discussing security monitoring in much more detail.