Cybersecurity

Core

Access and segmentation under control, demonstrable and manageable.

Outcome

  • Access paths (remote/onsite), accounts/roles and inter-zone routes mapped
  • Segmentation design (zones + conduits + desired communication) manageable in operations
  • Access design: routes, controls and logging for operators/vendors
  • Logging/monitoring plan (sources, retention, follow-up)
  • Implementation backlog with priorities, dependencies and acceptance criteria

Approach

  • Baseline: network zones, routes, accounts, remote access, log sources
  • Segmentation design (zones/conduits model)
  • Access design: roles/accounts, MFA where suitable, jump host where suitable, session logging
  • Logging: sources, retention, alerts/use-cases, ownership
  • Validation: tests/acceptance criteria per control

Reference model (small)

IEC 62443 is used as a reference model for structuring and prioritization (not a compliance track).

Cybersecurity and segmentation in OT/IT environment

FAQ

Do you also run compliance projects?

No. The focus is designing controls and making them work in operations.