{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/UTy2hZeG9i93aKX6MMxa/dfROSbhWkqay7YN1ItHI/tB_fz83oZ.js"],
  "sourcesContent": ["// Generated by Framer (5da54f8)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"ntkt6e\",mediaQuery:\"(min-width: 1440px)\"},{hash:\"1fxbe3y\",mediaQuery:\"(min-width: 1200px) and (max-width: 1439px)\"},{hash:\"65bupn\",mediaQuery:\"(min-width: 768px) and (max-width: 1199px)\"},{hash:\"j9keat\",mediaQuery:\"(max-width: 767px)\"}],description:\"Discover OT Security Best Practices for robust controls, protocols, and compliance to protect your industrial networks, learn actionable steps today.\",elements:{wpCDjGEyt:\"hero\"},framerSearch:{index:true},robots:\"max-image-preview:large\",serializationId:\"framer-OMTCl\",socialImage:\"https://framerusercontent.com/assets/UjFQRjLwtqcfMuspRj9O52n5Y.jpg\",title:\"OT Security Best Practices - Controls, Protocols, and Compliance\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,SAAS,WAAW,qBAAqB,EAAE,CAAC,KAAK,UAAU,WAAW,6CAA6C,EAAE,CAAC,KAAK,SAAS,WAAW,4CAA4C,EAAE,CAAC,KAAK,SAAS,WAAW,oBAAoB,CAAC,EAAE,YAAY,wJAAwJ,SAAS,CAAC,UAAU,MAAM,EAAE,aAAa,CAAC,MAAM,EAAI,EAAE,OAAO,0BAA0B,gBAAgB,eAAe,YAAY,qEAAqE,MAAM,mEAAmE,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EAClyBC,EAAqB,CAAC,QAAU,CAAC,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
