Operational procedures for OT attacks¶ Runbooks: Runbook: OT reconnaissance Runbook: IT to OT pivot Runbook: Industrial protocol abuse Runbook: Engineering workstation compromise