Operational procedures for OT attacks¶ Runbooks: Runbook: OT reconnaissance Runbook: IT to OT pivot Runbook: Industrial protocol abuse Runbook: Engineering workstation compromise Runbook: IT-to-OT compromise chain