Security should be implemented at all layers of the control network, with each layer further isolating subsequent layers from external threats. Such an approach is referred to as ‘defense in depth’, with the most critical equipment being the most protected [1]. Such a layered network implementation is shown in Figure 5.