Skip to content
OT Cybersecurity | | | 24 min read

Secure Remote Access to ICS - Security Principles

ICS/OT remote access - 17 principles for secure implementation. DMZ architecture, MFA, session recording, JIT access - aligned with IEC 62443, NIST 800-82 and CISA.

M
Michał Stępień
Łukasz Dudkowski Łukasz Dudkowski
Józef Sulwiński Józef Sulwiński
remote accessICSIEC 62443NIST 800-82zero trustVPN
Secure Remote Access to ICS - Security Principles
)}

In May 2021, Colonial Pipeline’s operator paid USD 4.4 million in ransom to the DarkSide group. The entry vector? A single compromised VPN password without multi-factor authentication. In December 2025, a coordinated attack on Polish renewable energy infrastructure exploited vulnerable edge devices with internet access, damaging RTU controller firmware in over 30 installations (CISA Alert, February 2026). Both incidents share a common denominator - poorly secured remote access to OT networks.

Remote access is essential - maintenance, diagnostics, firmware updates, and process monitoring all require connectivity. But every remote connection is an additional attack surface. Below we present 17 principles of secure remote access to industrial control systems (ICS), developed based on IEC 62443, NIST SP 800-82 Rev. 3, CISA recommendations, and experience from critical infrastructure projects.

Foundations - architecture and threats

Why remote access to OT is harder than IT

In IT networks, remote access via VPN has been standard for years - and a natural reaction of many organizations is to transfer the same patterns to operational technology (OT). This is where problems originate: PLCs exposed to the internet, simple VPN + RDP as the only protection, shared service accounts without MFA. OT environments have different priorities and constraints:

AspectITOT
PriorityData confidentialityAvailability and physical safety
Downtime toleranceMinutes to hoursSeconds (continuous processes cannot be interrupted)
UpdatesRegular, automaticRare, requiring maintenance windows and testing
ProtocolsHTTP/S, SSH, RDP (with authentication)Modbus, OPC, S7comm (often without authentication)
Lifecycle3-5 years15-25 years
Attack impactData loss, service disruptionEquipment damage, threat to life, environmental disaster

These differences mean that simply transferring IT solutions (VPN + RDP + password) is not sufficient. In OT you cannot terminate a session at any moment, you cannot automatically update devices on the other end of the connection, and control protocols (Modbus, S7comm) do not offer their own authentication mechanisms. Protections must be implemented at the network architecture level - hence the 17 principles described below.

Poorly secured remote access is one of the most common attack vectors against OT systems. The following incidents illustrate different scenarios and their consequences.

IncidentYearRemote access vectorConsequences
Colonial Pipeline2021VPN without MFA, compromised passwordPipeline shutdown for 6 days, USD 4.4 million ransom
Oldsmar Water2021TeamViewer on HMI station - internet accessibleAttempt to increase NaOH concentration from 100 to 11,100 ppm
Dharma ransomware2019-2020RDP exposed to the internetEncryption of SCADA systems via compromised terminal server
Attack on renewables in Poland2025Vulnerable edge devicesWiper malware, RTU firmware damage, loss of connectivity
Volt Typhoon2024VPN and edge device exploits (Fortinet, Ivanti)Pre-positioning in US critical infrastructure

Sources: CISA advisories, FBI/DOE joint fact sheet, CERT Polska, Mandiant Threat Research.

Segmentation as the foundation of remote access

Every remote access solution for OT must be built on proper network segmentation. According to IEC 62443-3-2, an industrial network is divided into zones with common security requirements, connected by conduits with controlled communication.

Remote access is a conduit in the standard’s definition - and must be treated with the same rigor as any other data flow between zones. The remote access point should be located in a dedicated DMZ zone, not directly in the OT network.


17 principles of secure remote access to OT

The principles are grouped into five categories corresponding to the main risk areas:

CategoryPrinciplesWhat it covers
Architecture1-4How to build the access path - DMZ, two-hop architecture, connection direction
Authentication and authorization5-8Who can enter and under what conditions - MFA, accounts, permissions
Monitoring and logging9-12What is visible in active sessions - logs, recording, OT protocol inspection
Activity restriction13-15What should be remotely accessible at all - SIS, file transfer, time windows
Hardening16-17Protection of the access infrastructure itself and incident readiness

Architecture

Principle 1: Avoid cascading risk transfer NIST SP 800-53: SC-7 (Boundary Protection), SC-7(5) (Deny by Default)

The remote access architecture should not allow traversal with a single protocol from the internet through the DMZ to the OT network. If the access chain is: VPN -> terminal server (RDP) -> engineering workstation (RDP), then compromising a single RDP vulnerability opens a path to OT. Dharma ransomware (2019-2020) exploited exactly this scenario - propagating through compromised RDP terminal servers to SCADA systems.

TIP

Use different protocols and services at each hop. CISA recommends a two-hop architecture: the first hop from the internet to the DMZ via VPN (IKE UDP 500, NAT-T UDP 4500, ESP protocol 50), the second hop from the DMZ to OT via an SSH session with a different set of credentials or through an SRA (Secure Remote Access) system - a class of products designed specifically for remote access to OT, with built-in session recording and industrial protocol inspection. This forces attackers to breach multiple independent security controls.

Principle 2: Connections initiated from the protected side NIST SP 800-53: SC-7(5) (Deny by Default, Allow by Exception)

Firewall rules should block all incoming connections to the OT network. Instead, the connection should be initiated from the OT network outward (to the DMZ zone). This way, inbound ports are not constantly exposed, and the session is available only temporarily.

NOTE

IEC 62443-3-3 SR 5.2 RE 1 requires a “deny by default” policy at zone boundaries - every permitted connection must be explicitly defined: source address, destination address, port, and protocol. Wildcards in firewall rules are not acceptable from Security Level (SL) 3 and above.

Principle 3: DMZ zone as a buffer NIST SP 800-53: SC-7(4) (External Telecommunications Services - DMZ)

A DMZ zone with firewalls on both sides must exist between the corporate network and OT. Intermediary servers (jump servers, terminals) should be located in the DMZ, not in the OT network. No production data should be stored on DMZ servers.

TIP

CISA recommends: minimal OS image (Windows Server Core without GUI or Linux with CIS Benchmark Level 2), two network interfaces (one to the DMZ, another to OT) without routing between them, disabling LLMNR, NetBIOS over TCP/IP, SMBv1, Print Spooler, and Remote Registry. The server should not belong to the corporate AD domain - a dedicated OT AD domain without trust relationships with the corporate domain.

Principle 4: No direct internet access to OT NIST SP 800-53: AC-17 (Remote Access), SC-7 (Boundary Protection)

No OT device should be directly accessible from the internet - neither through port forwarding nor by exposing a VPN endpoint directly on an OT device. This also applies to edge devices, VPN concentrators, and LTE modems. In its May 2025 recommendations, CISA explicitly prohibits exposing OT management interfaces to the internet, even indirectly.

TIP

Regularly scan the organization’s external attack surface with an exposure management tool (e.g., Tenable Attack Surface Management). Look for ports characteristic of OT: Modbus TCP 502, OPC UA 4840, S7comm 102, EtherNet/IP 44818, BACnet 47808, DNP3 20000. Every finding means a violation of this principle. Quarterly scanning allows detection of accidental exposures - e.g., after router configuration by an ISP or after deploying a new LTE modem.

Authentication and authorization

Architecture creates the framework - authentication determines who can enter and under what conditions.

Principle 5: Multi-factor authentication (MFA) NIST SP 800-53: IA-2(1) (MFA - Network Access), IA-2(2) (MFA - Non-privileged Access)

Every remote access to the OT network must require multi-factor authentication. MFA should be required at each hop: when logging into the VPN, when accessing the jump server, and when accessing the engineering workstation.

IEC 62443-3-3 SR 1.1 RE 2 requires MFA for access through untrusted networks from SL 3. In practice, every remote access traverses an untrusted network.

WARNING

PLCs and RTUs do not support modern authentication protocols. MFA must be implemented at the access gateway level (VPN + jump server), not on the end device. The PLC never sees the authentication event.

The choice of MFA method for OT environments has specific constraints:

MFA methodOT advantagesLimitationsWhen to use
Hardware TOTP (YubiKey, Token2)No smartphone required (often prohibited in factories), works offline, OATH RFC 6238 standardRequires physical token distributionMost OT environments
FIDO2 / WebAuthn (YubiKey 5)Strongest protection, phishing-resistant, no connectivity requiredNot compatible with legacy VPN clientsHigh-security environments (SL 3-4)
Smart card / PIVStandard in the energy sector (NERC CIP)Requires card reader on the workstationUtilities, critical infrastructure
TOTP app (Google Auth, MS Authenticator)Low cost, easy distributionRequires smartphoneOnly when smartphones are permitted on site
SMS OTP-NIST SP 800-63B does not recommend, telecom dependencyDo not use

Principle 6: Connection acceptance on the protected side NIST SP 800-53: AC-17(1) (Monitoring and Control of Remote Access)

A remote connection should not be established automatically. A person with permissions on the OT side (e.g., a maintenance engineer) should consciously accept the session - e.g., by generating a one-time link or approving a request in an application. Dedicated SRA systems implement this as a workflow: the service technician submits a request, the OT-side engineer approves it, and the system generates a one-time token with a time window.

In unmanned installations (subsea, unattended, remote farms), acceptance can be implemented through technical means - e.g., a dedicated out-of-band communication channel, approval via a mobile application, or a pre-authorized maintenance window schedule.

Principle 7: Individual accounts, not shared NIST SP 800-53: IA-2 (Identification and Authentication), AC-2 (Account Management)

Every remote user must have an individual account. Shared accounts (“service_vendor1”) make auditing and accountability impossible. IEC 62443-3-3 SR 1.1 RE 1 requires unique identification of every user from SL 2 - this also applies to machine accounts and automation scripts.

Vendor service accounts should be tied to a specific work order - see Principle 15 on JIT access. CISA recommends locking accounts after multiple failed login attempts and removing inactive service accounts.

TIP

Maintain a dedicated OT Active Directory domain without trust relationships with the corporate AD. Each vendor receives an account in the format: company_firstname.lastname_year (e.g., vendor1_jan.kowalski_2026). The account expires automatically after the contract end date. Review accounts quarterly - any account without activity in 90 days should be deactivated.

Principle 8: Principle of least privilege NIST SP 800-53: AC-6 (Least Privilege), AC-6(1) (Authorize Access to Security Functions)

A remote user should have access only to those systems and functions that are necessary for the specific task. IEC 62443-3-3 SR 2.1 RE 1 requires role-based authorization (RBAC) - a service engineer has a different set of permissions than an operator, network administrator, or auditor.

In practice, this means separating the role “can read PLC parameters” from “can modify PLC program” and “can start/stop the process.” SR 2.1 RE 3 (from SL 4) requires dual approval - critical operations require approval by two people.

TIP

Define roles and assign specific operations to them: the “service_readonly” role has read-only access to PLC parameters (Modbus FC 01-04). The “service_programming” role additionally has write access (FC 05-06, 15-16) - but only during an approved maintenance window. The “remote_operator” role can view the HMI but has no access to controller configuration. Document and review the permissions matrix quarterly.

Monitoring and logging

Even correct architecture and strong authentication are not sufficient if you cannot see what is happening in active sessions.

Principle 9: Traffic monitoring and identification NIST SP 800-53: SI-4 (System Monitoring), AU-2 (Event Logging)

All remote access traffic should be monitored and logged - with timestamp, user identifier, source and destination address, protocol, and result (success/failure). The system should generate alerts for: connections at unusual hours, connections from unknown locations, anomalies in OT protocols (unusual Modbus function codes, PLC register write attempts, program changes), and access attempts outside the scope of permissions.

Deep packet inspection (DPI) requires firewalls that understand industrial protocols - not just IP addresses and ports, but the content of control commands. Modbus TCP (port 502) is the most widely used control protocol in industrial installations. Every command has a function code (FC) - the table below classifies them by risk:

Function codeOperationRiskRecommendation
FC 01-04Read Coils / Discrete Inputs / Holding Registers / Input RegistersLow (reconnaissance)Permitted from SCADA/HMI, logged
FC 05, 06Write Single Coil / Single RegisterHigh (state change)Only from authorized engineering workstations, with time window
FC 15, 16 (0x0F, 0x10)Write Multiple Coils / Multiple RegistersHighSame as FC 05/06 - restrict to maintenance windows
FC 08Diagnostics (loopback, reset counters)MediumBlock from untrusted networks
FC 43 (0x2B)Read Device IdentificationMedium (discloses information)Block from untrusted networks

Firewalls with DPI support for OT protocols: Fortinet FortiGate (80+ OT protocols, 3,000+ command types), Palo Alto Networks NGFW (App-ID for Modbus, DNP3, IEC 104, OPC), Cisco IE4010/IR8340 (native Modbus TCP filtering), Moxa EDR-G9010 (DPI for Modbus, EtherNet/IP, PROFINET, OPC UA). Passive monitoring (no risk of process impact): Claroty, Nozomi Networks, Dragos - operating in tap/span port mode.

Principle 10: Terminate traffic in the DMZ, do not tunnel to OT NIST SP 800-53: SC-7(7) (Prevent Split Tunneling), SI-4 (System Monitoring)

An end-to-end encrypted tunnel between the remote server and the OT device prevents traffic inspection. Traffic should be terminated at the firewall or intermediary device in the DMZ, where it can be inspected (DPI), and then forwarded to OT in a separate session.

TIP

On the VPN gateway: disable split tunneling - all remote user traffic passes through the concentrator. On the DMZ firewall: enable SSL/TLS inspection for traffic to the jump server. On the jump server: the session to OT is established separately (different protocol, different credentials). Never forward an IPSec tunnel directly from the internet to a device in the OT network.

Principle 11: Session recording NIST SP 800-53: AU-3 (Content of Audit Records), AU-12 (Audit Record Generation)

Remote access sessions to OT systems should be recorded (screen recording, keystroke logging). Recordings serve as evidence in case of an incident and as an audit tool.

Session recording tools in the OT context:

ToolProtocolsKey featuresOT specifics
CyberArk PSMRDP, SSH, VNCTransparent proxy, keystroke indexing, Zero Standing PrivilegesIntegrations with Rockwell, Schneider Electric
BeyondTrust PRARDP, SSH, VNC, HTTPSCommand allowlist/blocklist in SSH, ruggedized applianceJump technology without direct IP connectivity
Wallix Bastion PAM4OTRDP, SSH, VNCOCR on recordings (searchable text), agentlessDedicated OT version, IEC 62443-2-4 compliant
ManageEngine PAM360RDP, SSH, Telnet, VNC, SQLSession shadowing, live takeoverRouting through jump server to PLC/SCADA

Key requirement: recordings must be stored in a location inaccessible to the recorded users (immutable audit log).

Principle 12: Session management NIST SP 800-53: SC-10 (Network Disconnect), AC-12 (Session Termination)

The OT-side administrator should have the ability to view active sessions in real time, terminate sessions when irregularities are detected, and set time limits (auto-disconnect after timeout - NIST recommends 15-30 minutes of inactivity).

WARNING

Automatic session termination during a PLC firmware update can interrupt a critical process and cause device damage. The disconnection decision should be deliberate - the operator must have the ability to extend the session with logged justification.

Activity restriction

Principles 1-12 address how to build and control access. Principles 13-15 answer the question: what and when should be remotely accessible at all.

Principle 13: Restrict access to OT components NIST SP 800-53: AC-3 (Access Enforcement), PE-3 (Physical Access Control)

Systems performing safety functions (SIS - Safety Instrumented Systems) should not be accessible via remote access. Remote modification of SIS logic is an unacceptable risk in most environments - IEC 62443-3-3 SR 5.1 requires separation of SIS from the rest of the OT network. NIST SP 800-82 Rev. 3 Section 5.5 explicitly addresses protection of safety systems.

WARNING

Safety PLCs (e.g., Triconex, HIMA), ESD systems (Emergency Shutdown), F&G systems (Fire and Gas), SIL 2+ regulators, and any systems whose malfunction could threaten life or the environment. Modification of these systems’ logic requires physical presence and a Management of Change (MOC) procedure.

Principle 14: File transfer control NIST SP 800-53: SI-3 (Malware Protection), MA-4 (Nonlocal Maintenance)

Files transferred to the OT network (firmware, configurations, patches) must undergo malware scanning in the DMZ zone. NIST MA-4 requires authorization and monitoring of remote maintenance, including file transfers. Dedicated SRA systems offer on-the-fly scanning.

TIP

Deploy a security kiosk in the DMZ - a dedicated station for file inspection, without a permanent connection to the OT network. The kiosk should offer multi-engine scanning (e.g., OPSWAT MetaDefender - dozens of AV engines simultaneously), whitelisting of permitted file types (e.g., only .L5X for Rockwell, .ZAP for Siemens), and logging of every transfer with user identifier. Files pass from the kiosk to OT manually or through a controlled unidirectional channel.

Principle 15: Time-limited access (JIT) NIST SP 800-53: AC-2(2) (Automated Temporary and Emergency Account Management)

Remote access should be active only for the duration of work - the Just-In-Time (JIT) model. The account is activated upon request, with a defined time window, and automatically deactivated when time expires. NIST AC-2(2) requires automated management of temporary and emergency accounts - including automatic deactivation.

A forgotten service account active months after work completion is a typical attack vector. JIT eliminates this risk structurally - tools such as CyberArk Alero or BeyondTrust JIT access generate credentials on demand and revoke them automatically.

Hardening and access infrastructure protection

Every device in the remote access chain is a potential target - from the VPN concentrator to the jump server.

Principle 16: Hardening of access devices NIST SP 800-53: CM-7 (Least Functionality), SI-2 (Flaw Remediation)

Terminal servers, jump servers, VPN concentrators - every device in the remote access chain must be hardened according to CIS Benchmarks. NIST CM-7 requires limiting functionality to the necessary minimum - which in practice means:

TIP

Jump server:

  • Disable unnecessary services: LLMNR, NetBIOS, SMBv1, Print Spooler
  • No membership in the corporate AD domain
  • USB port blocking at the BIOS level
  • Disable clipboard sharing and file transfer (unless explicitly required)
  • Host firewall: inbound only from authorized VPN IPs, outbound only to specific OT device IPs (RDP 3389, SSH 22 or OT protocol ports)

VPN gateway:

  • Critical updates within 48 hours
  • Strong cryptography: IKE AES-256, SHA-256+, DH Group 14+
  • Disable weak cipher suites and split tunneling
  • Minimal port exposure: UDP 500 (IKE), UDP 4500 (NAT-T), protocol 50 (ESP)

Edge devices (routers, LTE modems, VPN appliances):

  • Include in the patch management cycle - do not treat as “invisible background”
  • The attack on Polish renewables (2025) and Volt Typhoon campaigns (2024) exploited vulnerabilities in exactly this category of devices

Principle 17: Contingency plan and disconnection procedure NIST SP 800-53: IR-4 (Incident Handling), IR-8 (Incident Response Plan)

A documented and rehearsed procedure for immediate disconnection of remote access upon incident detection must exist. NIST IR-4 breaks incident handling into six phases - from preparation to recovery. The disconnection procedure should be defined for each of them.

TIP

  1. Predefined firewall rules - prepare rules blocking all remote access traffic, ready for activation with a single command (script or predefined policy on the firewall)
  2. Contact list - who decides on disconnection (on-duty OT engineer), who executes it (network administrator), who to notify (CISO, IR team, vendors with active sessions)
  3. Procedure for active sessions - how to safely terminate an ongoing service session (notification to the service technician, documentation of work status)
  4. Tabletop exercise - rehearse the procedure at least once every six months, measure the time from decision to full disconnection

Decision matrix - choosing a remote access solution

The choice of solution depends on the required Security Level (SL) according to IEC 62443, budget, and environment specifics. The matrix below helps evaluate available options.

CriterionVPN + RDP (typical IT)Dedicated SRA (Honeywell, Claroty, Dispel)Zero Trust OT (Zscaler, Secomea)
IEC 62443 compliancePartial - requires additional configurationFull - designed for OTFull - built-in zones and conduits
MFANeeds to be addedBuilt-inBuilt-in
Session recordingNeeds to be added (e.g., CyberArk)NativeNative
OT protocol inspectionNoneDPI Modbus, OPC, S7Depends on the solution
JIT accessManualBuilt-in workflowBuilt-in
Initiation from protected sideDifficult to implementStandard featureStandard feature
File scanningNeeds to be addedBuilt-inDepends
CostLow (existing infrastructure)Medium-high (license + deployment)Medium-high (subscription)
Deployment complexityLowMediumMedium-high
RecommendationTemporary, low SLSL 2-3, production, energySL 3-4, critical infrastructure

SL = Security Level per IEC 62443. SL 1: protection against accidental violations. SL 2: protection against intentional attack with simple means. SL 3: protection against sophisticated attack. SL 4: protection against APT attack.

Remote access audit checklist for OT

The following checklist allows you to assess the current state of security controls and identify gaps requiring remediation. It can be used as a starting point for a quarterly review or as the scope of an IEC 62443 audit. If you need assistance designing a remote access architecture for OT - contact us.

CategoryElementDescriptionStatus
ArchitectureDMZRemote access passes through a DMZ zone with firewalls on both sides
No direct accessNo OT device is directly reachable from the internet
Different protocols at each hopConnection to DMZ and from DMZ to OT uses different protocols
Initiation from protected sideConnections initiated from OT to DMZ, not the reverse
AuthenticationMFA at each hopMulti-factor authentication on VPN, jump server, and target workstation
Individual accountsEach user has a unique account with assigned identity
JIT accessService accounts active only for the duration of work
OT-side acceptanceA person on the protected side approves each session
MonitoringSession logsAll sessions logged with timestamp, user, source
Screen recordingSessions to critical systems are recorded
Anomaly alertingAlerts for unusual hours, locations, actions
OT traffic inspectionTraffic terminated at firewall/DPI, not tunneled end-to-end
RestrictionsSIS not remotely accessibleSafety Instrumented Systems not accessible via remote access
File scanningFiles transferred to OT scanned for malware
Time limitsSessions with auto-disconnect after timeout
Minimum privilegesUsers have access only to necessary systems
HardeningAccess device updatesJump servers, VPN, edge devices up to date
Disconnection procedureDocumented emergency remote access shutdown procedure
Quarterly reviewRegular review of accounts, permissions, and firewall rules

Mapping principles to IEC 62443 and NIST SP 800-82

Each of the 17 principles maps to specific standard requirements. The table below allows demonstrating compliance with regulatory requirements.

PrincipleIEC 62443NIST SP 800-82 Rev. 3NIST SP 800-53
1. No cascading risk62443-3-3 SR 5.1 (segmentation)Section 5.1 (architecture)SC-7 (boundary protection)
2. Initiation from protected side62443-3-3 SR 5.2 (zone control)Section 5.3 (firewall)SC-7(5) (deny by default)
3. DMZ62443-3-3 SR 5.1Section 5.1, 5.3SC-7(4) (DMZ)
4. No direct access62443-3-3 SR 5.1, SR 5.2Section 5.3SC-7, AC-17
5. MFA62443-3-3 SR 1.1, SR 1.2Section 6.2 (authentication)IA-2(1), IA-2(2)
6. OT-side acceptance62443-3-3 SR 2.1Section 6.2AC-17(1)
7. Individual accounts62443-3-3 SR 1.1Section 6.2IA-2, AC-2
8. Least privilege62443-3-3 SR 2.1Section 6.2AC-6 (least privilege)
9. Traffic monitoring62443-3-3 SR 6.1Section 6.4 (monitoring)SI-4, AU-2
10. No end-to-end tunnels62443-3-3 SR 5.2, SR 3.1Section 5.3SC-7, SI-4
11. Session recording62443-3-3 SR 6.1, SR 6.2Section 6.4AU-3, AU-12
12. Session management62443-3-3 SR 2.5Section 6.2SC-10, AC-12
13. SIS access restriction62443-3-3 SR 5.1Section 5.5 (safety)PE-3, AC-3
14. File control62443-3-3 SR 3.2Section 6.3SI-3 (malware protection)
15. JIT access62443-3-3 SR 2.1Section 6.2AC-2(2) (temporary accounts)
16. Hardening62443-3-3 SR 7.1, SR 7.2Section 6.5CM-7, SI-2
17. Disconnection procedure62443-3-3 SR 6.2Section 6.6 (IR)IR-4, IR-8

NIST SP 800-53 controls mapping

Key NIST SP 800-53 Rev. 5 controls for secure remote access to OT:

ControlNameSignificance for remote access
AC-17Remote AccessRemote access policy, authorization, encryption, monitoring
IA-2Identification and AuthenticationUser authentication with MFA
SC-7Boundary ProtectionFirewall, DMZ, zone flow control
SC-10Network DisconnectAutomatic disconnection after session timeout
AU-2Event LoggingRemote access event logging
AU-12Audit Record GenerationSession recording, keystroke logging
AC-6Least PrivilegeMinimum privileges for remote users
SI-4System MonitoringNetwork traffic anomaly monitoring
IR-4Incident HandlingRemote access incident response procedures

Source: NIST SP 800-53 Rev. 5, NIST SP 800-82 Rev. 3, IEC 62443-3-3.

Reference architecture

The following text diagram illustrates the recommended remote access architecture for OT networks:

Internet
    |
[External firewall]
    |
=== DMZ Zone ===
    |-- VPN Gateway (MFA, tunnel termination)
    |-- Jump Server / SRA Portal (session recording, DPI)
    |-- File kiosk (malware scanning)
    |
[Internal firewall] (connections initiated from OT)
    |
=== OT Network ===
    |-- Engineering workstation (session acceptance)
    |-- HMI / SCADA
    |-- PLC / RTU
    |
=== SIS Network === (no remote access)
    |-- Safety PLC
    |-- Emergency Shutdown

Sources

Omówimy zakres, metodykę i harmonogram.