Auditing cyber security configuration for control system applications | IEEE Conference Publication | IEEE Xplore