System Security Practices
Various techniques can be used to make systems more secure, including:
Using an air-gapped topology (no direct internet access). See Isolated LAN for example illustrations.
Only using devices that do not have integrated Wi-Fi or Bluetooth.
Locating equipment racks restricted-access areas.
Using KVM extenders so that I/O connectors are not locally available.
Blocking unused switch ports.
Enforcing MAC address white-listing.
Using fiber instead of copper to interconnect devices.
Using secure isolators between devices.