Summary
In this chapter, we reviewed the ICS architecture and took a deep dive into certain areas and topics. This helped us point out either changes from the first edition or to help facilitate discussions that will be provided later in this book.
By now, you should have a solid understanding of what a typical ICS architecture should look like and include. We will expand upon certain areas in later chapters, mainly to point out how this architecture is used in security monitoring practices.
First, though, in the next chapter, we are going to revisit the Industrial Demilitarized Zone IDMZ for short.