If you feel that the program development process is portrayed a bit simplistically, then you are probably right. The devil is in the details, they say. That holds true for implementing security as well. Each and every subject covered in this chapter can be expanded upon. Doing so, though, would quickly become overwhelming for the reader and would require system-specific instructions and guidance. I have shown the high-level tasks and activities involved with defining a security program and will leave it up to you, the reader, to add the details that work best for your unique situation and ICS environment.
And, with this discussion on security program development, we are closing the book on ICS security. Not literally of course, as our journey has just started, and I hope that after reading this book your journey becomes a little easier. Implementing security of any kind...