For Cybersecurity Good Practice Guidelines, please refer to the following:
Securing Operational Technology (OT) Systems and Defense in Depth
Risk Assessment
Network Separation and the Demilitarized Zone
Network Segmentation
Open Systems Interconnection (OSI) vs Department of Defense (DoD) (TCP/IP) Models - with Operational Technology (OT) & Information Technology (IT) Protocols
Communication Protocols and Port Usage Overview
System Access Control
Device Hardening
Monitoring and Maintenance
An Example of Network Security Architecture
Methods of Attack
Last update - February 2026