Why proper architecture matters
Any solid design starts with a sound foundational architecture. This holds true for ICS cybersecurity as well. Spending the proper amount of time to come up with a solid architecture that takes security, performance, uptime requirements, and resiliency into consideration will pay in dividends throughout the lifetime of the ICS environment. The effects of the decisions and considerations we've made will ripple into anything we do later on, so let's go over some fundamental requirements, considerations, and recommendations.
In Chapter 4, Designing the ICS Architecture with Security in Mind, we will take a closer look at the security aspects around a well-designed ICS network architecture. The rest of this chapter will be an architectural overview/review of the recommended ICS network architecture, updated with new and revised considerations since the first edition of this book hit the shelves.