A security assessment that simulates an internal attacker in the corporate network attempting to obtain unauthorized access to the ICS environment