In this episode, we discuss common attack methods that can be used to attack a BAS, we look at how attacks progress, and we discuss cyber security controls that can be put in place using existing frameworks.