Challenge 12: Combining challenges 10 and 11

For the ultimate challenge:

  1. Build complete security architecture (Challenge 10)

  2. Design secure critical operation (Challenge 11)

  3. Integrate them: your critical operation uses your security architecture

  4. Test: Does it work? Is it secure? Is it usable?

This is what real OT security programs do.