Advisory Schedule a Technical Discovery Call — Book your session today! »

· Industrial Cybersecurity  · 3 min read

OT Cybersecurity: From the Purdue Model to IEC 62443

Being "disconnected" is no longer an option. Learn to design a robust industrial network using Zones and Conduits to protect your critical assets.

Being "disconnected" is no longer an option. Learn to design a robust industrial network using Zones and Conduits to protect your critical assets.

For decades, plant-floor cybersecurity followed the “Air Gap” rule: “If the PLC isn’t on the internet, it can’t be hacked”. Today, with the rise of IIoT, remote maintenance, and cloud-based MES systems, the Air Gap is dead.

Modern industrial cybersecurity is not about putting in a firewall and forgetting about it. It’s about defense in depth. In this technical guide, we explore how to move from a theoretical diagram (Purdue) to a real implementation (IEC 62443).

1. The Purdue Model: The Foundation of Hierarchy

The Purdue Model (ISA-95) tells us where systems live. It is fundamental for understanding hierarchy:

graph TD
    subgraph "Level 4-5: Enterprise (IT)"
        Cloud[Cloud / ERP]
    end
    subgraph "Level 3.5: DMZ"
        Firewall1[IT/OT Firewall]
    end
    subgraph "Level 3: Operations"
        MES[MES / Historian]
    end
    subgraph "Level 1-2: Control"
        SCADA[SCADA / HMI]
        PLC[PLC Controllers]
    end
    subgraph "Level 0: Process"
        Sensors[Sensors / Actuators]
    end

    Cloud --- Firewall1
    Firewall1 --- MES
    MES --- SCADA
    SCADA --- PLC
    PLC --- Sensors

2. IEC 62443: Zones and Conduits

While Purdue tells you the levels, the IEC 62443 standard tells you how to protect the communication between them. The key concept is Zones & Conduits:

  • Zone: A group of assets (PLCs, HMIs) with similar security requirements.
  • Conduit: The communication path between zones. This is where you apply industrial firewalls (e.g., FortiGate Rugged, Stratix) and Deep Packet Inspection (DPI) for Modbus or Profinet.

[!IMPORTANT] A PLC should never talk directly to the ERP. It must always pass through a gateway or a historian in an industrial DMZ (Level 3.5).

3. Asset Hardening Checklist

If you have a PLC on your network, ask yourself these questions:

  1. Unnecessary Ports? Is the PLC’s web server or FTP enabled? If you don’t use it, disable it.
  2. Authentication? Do your PLCs have a password for program downloads? (Siemens S7-1500 asks for it by default, older PLCs don’t).
  3. Physical Segmentation? Are you mixing security camera traffic with control traffic? Use VLANs or managed switches.

4. The Human Factor: Remote Access

80% of attacks on critical infrastructure enter through poorly configured remote access.

  • Don’t use Port Forwarding. Never open PLC port 502 directly to the internet.
  • Use Industrial VPNs: Solutions like Ewon Cosy or HMS Anybus that create outbound tunnels are much more secure than traditional VPNs.

Conclusion

OT cybersecurity is a balance between availability and protection. If your firewall blocks an emergency message that stops a boiler, your system is safe but useless. Intelligent segmentation using IEC 62443 is the only way to scale your IIoT projects without risk.


Official Sources and Guides:

Back to Blog

Related Posts

View All Posts »