When trying to secure network assets, a long and often complex list of configurations have to be performed, to ensure industrial control systems have the appropriate cyberprotection. This paper will present a systematic and automatic approach to those security configurations, with a focus on network assets, which aim to decrease the probability of implementing incorrect or incomplete configurations that can occur when configurations are performed manually.