Architecture best practices
Our best practice documents contain security recommendations for ENCS members’ security specialists. These best practices for cyber security are developed in the security programs, based on the experience of other members. They cover a wide variety of topics, such as setting up an information security management system, defining use cases for security operations, and selecting sensors to monitor operational technology systems.
WP-092-2025: Connecting OT systems to the outside
OT systems are no longer isolated from other systems. With increasing digitalisation, OT systems are starting to depend on IT systems and external sources of
WP-090-2025: Threat analysis and security measures for virtualization and containerization
The idea of using virtualization and containerization technologies in substations has been around for quite some time, allowing for reduced hardware needs and greater operational