In this chapter, we reviewed some of the ICS cybersecurity resources that have been provided by Rockwell Automation and the tools that can be used to prevent unauthorized project views or edits. Rockwell has invested heavily in its cybersecurity practices over the past decade and has come to the table with numerous products, services, and guidance to help protect their customers from cyber threats.
In the next chapter, Building a Robot Bartender in Logix, we will put all the pieces we have learned throughout this book together and use them to build a sample application. We will be working through the steps to create an operational robot bartender.