This concludes the discussion about the security in-depth model. In the following chapters, we will go into more detail on every individual layer and see how the security controls for the particular security layer are applied to typical ICS environments, including configuration exercises of common security applications and software.