Abstract
The Guide makes a survey of the most appropriate techniques available from the research field and how they can be used with the multiple data sources from the IT/OT/IoT/IIoT integration, common to critical infrastructures. While surveying different problems and solutions, the Guide presents state of the art good practices and recommendations to cope with challenges and issues identified through the surveys. The Guide doesn’t cover the so called Security Intelligence based on web data sources analytics.