This document discusses the importance of authentication and authorization in ensuring the security of critical infrastructure systems such as ICSs and SCADA. It explains how these mechanisms restrict access to resources and make it difficult for hackers to exploit the system. Suggestions for securing field communication are also provided, including the implementation of IPsec, Modicon communication, and the distributed network protocol.