Guidance on best practices

Idea created by Brian Employee on Nov 1, 2018
    Originally posted on UserVoice

    As an ICS systems engineer, I need to provide broad, real-time access to operations data using the PI System while assuring that sensitive systems are defended appropriately via standard security zones and authorization mechanisms.  So I need guidance on best practices in deployment and security as well as tools to verify them.