In this document, security architecture for securing network access to the control room of a nuclear power plant is described. The design takes advantage of existing, thoroughly tested components. This minimizes the amount of custom code needed, which in turn assists in vulnerability and change...