Cybersecurity
Core
Access and segmentation under control, demonstrable and manageable.
Outcome
- Access paths (remote/onsite), accounts/roles and inter-zone routes mapped
- Segmentation design (zones + conduits + desired communication) manageable in operations
- Access design: routes, controls and logging for operators/vendors
- Logging/monitoring plan (sources, retention, follow-up)
- Implementation backlog with priorities, dependencies and acceptance criteria
Approach
- Baseline: network zones, routes, accounts, remote access, log sources
- Segmentation design (zones/conduits model)
- Access design: roles/accounts, MFA where suitable, jump host where suitable, session logging
- Logging: sources, retention, alerts/use-cases, ownership
- Validation: tests/acceptance criteria per control
Reference model (small)
IEC 62443 is used as a reference model for structuring and prioritization (not a compliance track).

FAQ
Do you also run compliance projects?
No. The focus is designing controls and making them work in operations.