Summary

If you feel that the program development process is portrayed a bit simplistically, then you are probably right. The devil is in the details, they say. That holds true for implementing security as well. Each and every subject covered in this chapter can be expanded upon. Doing so, though, would quickly become overwhelming for the reader and would require system-specific instructions and guidance. I have shown the high-level tasks and activities involved with defining a security program and will leave it up to you, the reader, to add the details that work best for your unique situation and ICS environment.

And, with this discussion on security program development, we are closing the book on ICS security. Not literally of course, as ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.