The standards for how to remotely access a piece of operational technology have changed quite a bit since 2014. Now, safely accessing equipment requires a moving target defense network, a disposable intermediate component, a zero-trust architecture, and comprehensive monitoring.