I am looking for research on specific risks when trust relationships are set up between IT and OT domains or worse when the IT domain is used to control users/systems access within the OT network directly. Alternatively research on what a secure domain deployment should ideally look like in the OT environment.