Skip to content
OT Cybersecurity | | | 16 min read

OT Network Segmentation - Protecting Industrial Systems from Cyberattacks

OT network segmentation per IEC 62443 - zones, conduits, implementation methods and monitoring tools. A practical guide with real-world incident examples.

Józef Sulwiński Józef Sulwiński
network segmentationIEC 62443OT securityzones and conduitsSCADA
OT Network Segmentation - Protecting Industrial Systems from Cyberattacks

Attacks on industrial infrastructure are no longer a theoretical scenario. In December 2025, a coordinated attack struck over 30 Polish wind and solar farms, a CHP plant serving half a million customers, and a manufacturing company - damaging RTU controller firmware and severing operator communications (CERT Polska report, January 2026). Before that, Colonial Pipeline, Oldsmar Water Treatment, COSMICENERGY - each of these incidents demonstrated that a lack of segmentation between IT and OT networks leads to real-world consequences.

This article consists of two parts. The first explains the theoretical framework - what segmentation means under IEC 62443, which methods to apply, and which OT protocols to account for. The second shows how we approach this in practice - with specific matrices, checklists, and control mappings.

81%

of Dragos assessments found weak IT/OT segmentation

73%

of IR incidents - compromised VPN/jumphost as IT-OT pivot

32%

of organizations invest in segmentation (SANS 2025)

42 days

avg ransomware dwell time in OT (vs 5 days with visibility)

Source: Dragos 2026 OT Cybersecurity Year in Review, SANS State of ICS/OT Security 2025

The Problem and the Framework

Why Segmentation Is Critical

Traditional OT environments were built as isolated networks. That isolation no longer exists - SCADA systems connect to the cloud, engineers remotely service PLCs, production data flows into ERP systems. Without segmentation, an attacker who gains access to one network segment can move laterally until reaching a PLC controlling a physical process.

Lessons from Incidents

Five incidents from recent years illustrate different scenarios where a lack of segmentation enabled or deepened an attack. Each carries a concrete lesson for zone and conduit architecture design.

IncidentYearWhat HappenedSegmentation Lesson
Colonial Pipeline2021IT ransomware - operator shut down pipeline because they could not verify MES (billing) system integrityOT dependency on IT business systems requires analysis and isolation
Oldsmar Water2021Remote access (TeamViewer) to HMI - attempted chemical concentration change in water supplyNo segmentation between remote access and the control system
COSMICENERGY2023Malware interacting with RTUs via IEC 60870-5-104 - switch manipulationOT protocols without authentication require network-level isolation
Volt Typhoon2024Chinese APT group pre-positioning in US critical infrastructure IT (techniques mapped in MITRE ATT&CK)Lateral movement from IT to OT as a strategic objective
Polish Renewables Attack2025Coordinated attack on 30+ wind/solar farms, CHP plant (500k customers), manufacturing company. RTU firmware damaged, wiper malware, operator communications severedDestructive (not financial) attack - OT device firmware damage requires physical separation and monitoring

Sources: CISA Alert AA21-131A, FBI/CISA/EPA joint advisory, Mandiant Threat Research, CISA Advisory AA24-038A, CERT Polska “Energy sector incident” (January 2026).

Zones and Conduits - The IEC 62443 Model

The Purdue Model (ISA-95) defines the industrial network hierarchy (levels 0-5), but the rigid level-based division does not capture the complexity of modern OT environments. IEC 62443-3-2 introduces a more flexible approach:

  • Zone - a group of assets with common security requirements
  • Conduit - a controlled communication channel between zones
  • Each zone receives a Security Level Target (SL-T) on a scale from SL 1 to SL 4
  • Zone boundaries are derived from risk assessment - not imposed top-down

Segmentation Methods - Comparison

In practice, OT network segmentation relies on several methods, often used in combination. Physical separation and DMZ protect the IT/OT boundary, firewalls with DPI control inter-zone traffic, and VLANs with micro-segmentation complement protection within zones. Method selection depends on the zone’s target Security Level (SL-T) - the higher the SL, the stronger the mechanisms.

MethodDescriptionWhen to UseLimitations
Physical separationSeparate switches, cables, infrastructureSIS, most critical systemsIncreasingly difficult as data exchange needs grow
DMZ zoneBuffer with firewalls on both IT/OT sidesAlways - every installation should have a DMZRequires maintaining intermediary servers
VLANs with ACLsLogical network division on switchesBasic segmentation within zonesVulnerable to VLAN hopping, insufficient alone
Firewalls with DPIDeep inspection of OT protocols (Modbus, OPC UA)Boundaries between IEC 62443 zonesRequires OT protocol expertise
Data diodesHardware-enforced unidirectional data flowTelemetry export from OT to ITNo return communication - not suitable for all scenarios
Micro-segmentationGranular per-device policies (Zero Trust)Supplement to zone-based segmentationEarly-stage adoption in OT environments

OT Network Protocols - What to Know for Segmentation

Below are protocols that traverse Ethernet/IP networks and can be controlled by firewalls, ACLs, and DPI systems. Serial protocols (Modbus RTU, PROFIBUS, HART 4-20mA, CANbus) are not included here - they operate below the network layer and require physical protection, not network segmentation.

Control and SCADA communication protocols:

ProtocolPortAuth.Encr.ApplicationSegmentation Notes
Modbus TCP502NoneNonePLC, RTU, SCADAFilter by function code on DPI firewall
OPC UA4840X.509 cert.TLSSystem integrationBest secured - enforce signed+encrypted mode
OPC Classic (DA)135+Weak (DCOM)NoneLegacy SCADA systemsDCOM requires many ports - difficult to firewall
DNP3/TCP20000Optional (SA v5)OptionalEnergy, water utilitiesSA v5 adds HMAC - many deployments without SA
IEC 60870-5-1042404NoneNonePower gridTargeted by COSMICENERGY and Industroyer - isolate or DPI
S7comm102NoneNoneSiemens controllersExploited by Stuxnet. S7comm-plus (v4+) adds integrity

Industrial automation protocols (Ethernet):

ProtocolPort / LayerAuth.Encr.ApplicationSegmentation Notes
EtherNet/IP (CIP)TCP 44818, UDP 2222None*None*Rockwell/Allen-Bradley*CIP Security adds TLS/DTLS with X.509
PROFINETL2 (EtherType)NoneNoneSiemens, factory automationRT/IRT bypasses IP stack - requires L2-aware firewalls
EtherCATL2 (0x88A4)NoneNoneMotion control, robotics”Processing on the fly” - compromising one slave threatens the entire network
IEC 61850 MMSTCP 102NoneNoneElectrical substationsMMS over TCP - controllable by firewall
IEC 61850 GOOSEL2 (0x88B8)NoneNoneElectrical substationsL2 multicast without authentication - VLAN as only isolation

Building management and IoT protocols:

ProtocolPortAuth.Encr.ApplicationSegmentation Notes
BACnet/IPUDP 47808None*None*BMS, HVAC, access control*BACnet Secure Connect (2019) adds TLS. Segment from process OT
MQTTTCP 1883 / 8883OptionalTLS (port 8883)IIoT, telemetryDo not allow port 1883 in production - enforce TLS
CoAPUDP 5683DTLS (opt.)DTLS (opt.)Resource-constrained IoTVerify endpoints and proxy configuration

Source: protocol specifications (modbus.org, opcfoundation.org, IEEE 1815), NIST SP 800-82 Rev. 3.

Segmentation Below the Network Layer - Fieldbus and Serial Protocols

IEC 62443 zones and conduits apply to all assets - not just networked ones. An RS-485 cable between a PLC and an RTU is a conduit under the standard, just like an Ethernet connection. The problem is that for fieldbus/serial protocols there are no equivalents of firewalls or ACLs. The only available mechanisms are physical protection and device hardening.

Serial/fieldbus protocols in the segmentation context:

ProtocolPhysical LayerAuth.Encr.Protection Mechanism
Modbus RTURS-485 / RS-232NoneNonePhysical cable and cabinet protection. Control at serial-to-Ethernet gateway (converter as inspection point)
PROFIBUS DP/PARS-485 / MBP (IEC 61158-2)NoneNonePhysical protection. Disable unused master ports. Controller-level segmentation
HART (4-20mA)Analog current loop with FSKNoneNonePhysical junction box protection. Restrict access to configuration handhelds
WirelessHARTIEEE 802.15.4 (2.4 GHz)Yes (network keys)AES-128Only fieldbus with built-in encryption. Manage join/session/network keys
FOUNDATION FieldbusH1: IEC 61158-2, HSE: EthernetNone (H1)None (H1)H1: physical protection. HSE: segment as Ethernet
CANbus / CANopenDifferential bus (ISO 11898)NoneNoneEvery node sees all traffic. CAN gateways as segmentation point between domains
AS-Interface2-wire (data + power)NoneNoneSimple sensor/actuator protocol. Physical protection is the only option

What this means in practice:

  1. Physical protection is segmentation - for serial protocols, a locked control cabinet, access control to technical rooms, and seals on junction boxes serve the same role as a firewall on an Ethernet network
  2. Protocol gateways as control points - a Modbus RTU -> Modbus TCP converter or PROFIBUS -> PROFINET gateway is the only place where fieldbus traffic can be inspected and filtered
  3. Device hardening - disable unused communication ports on PLCs and controllers, lock programming mode, password-protect configuration
  4. WirelessHART as the exception - the only fieldbus protocol with built-in encryption (AES-128) and key management. However, wired protocols have a significant advantage over wireless: disrupting communication requires physical access to the cable, which significantly raises the bar for an attacker. Wireless protocols, even with encryption, are vulnerable to radio jamming

Consequence for zone architecture: IEC 62443 defines a target Security Level (SL-T) for each zone. SL 2 and above require authentication and access control - requirements that serial protocols (Modbus RTU, PROFIBUS, HART) cannot by definition meet. This means devices communicating exclusively over fieldbus should reside in an SL 1 zone (protection against casual violations), and the SL 2+ zone boundary should run at the PLC/RTU controller - which is the gateway between fieldbus and Ethernet and the only device capable of implementing authentication and access control.


How We Do It - The SEQRED Approach

SEQRED Documentation Example: Zone-to-Zone Flow Matrix

In segmentation projects we use a zone-to-zone flow matrix - a table defining permitted connections, protocols, and communication direction for each pair of zones. This is the key document that becomes the basis for firewall configuration.

Zone definitions:

ZoneDescriptionExample AssetsSL-T
Z1 - ControlControllers and field devicesPLC, RTU, sensors, actuatorsSL 3
Z2 - SupervisoryVisualization and engineering systemsHMI, engineering workstations, OPC serverSL 2
Z3 - OperationsProduction managementHistorian, MES, reporting serversSL 2
Z4 - DMZIT/OT buffer zoneJump host, data mirror, OPC gatewaySL 2
Z5 - ITCorporate networkERP, email, InternetSL 1

Flow matrix (source -> destination):

Source \ DestZ1 ControlZ2 SupervisoryZ3 OperationsZ4 DMZZ5 IT
Z1 Control-Modbus TCP (read), OPC UADenyDenyDeny
Z2 SupervisoryModbus TCP (r/w), OPC UA-OPC UA (read)DenyDeny
Z3 OperationsDenyOPC UA (read)-SQL, HTTPS (to mirror)Deny
Z4 DMZDenyDenySQL (read)-HTTPS, SMTP
Z5 ITDenyDenyDenyHTTPS, RDP (jump host)-

Key principles:

  1. No direct access from IT to the control zone - traffic from Z5 to Z1 traverses three intermediate zones
  2. DMZ as the only contact point - Z4 is the only zone communicating with both OT (Z3) and IT (Z5)
  3. Read/write differentiation - an HMI operator (Z2) can write to PLCs (Z1), but the historian (Z3) can only read from Z2
  4. Default policy: deny all - only explicitly listed flows are permitted

SEQRED Documentation Example: Segmentation Method vs Security Level Matrix

After defining zones and assigning target Security Levels (SL-T), you need to select appropriate segmentation methods. The matrix below shows which methods are sufficient and which require supplementation depending on SL. We use this as a starting point for client discussions - the final selection follows from risk assessment of the specific installation.

Segmentation MethodSL 1SL 2SL 3SL 4
VLANs with ACLsSufficientSupplementInsufficientInsufficient
Firewall with DPIExcessiveSufficientSufficientSupplement
DMZ zoneRecommendedRequiredRequiredRequired
Data diodeOptionalOptionalRecommendedRequired
Physical separationOptionalOptionalRecommendedRequired

Sources: IEC 62443-3-2:2020, CISA “Layering Network Security Through Segmentation” (2022), NIST SP 800-82 Rev. 3. Matrix is a SEQRED development.

NIST SP 800-53 Control Mapping to OT Segmentation

Below is a mapping of key controls from the NIST SP 800-53 Rev. 5 catalog to OT network segmentation methods:

ControlDescriptionOT Application
SC-7 Boundary ProtectionCommunication control at interfacesFirewalls at zone boundaries, DMZ
SC-7(5) Deny by DefaultDefault traffic blockingDeny-all policy between zones
SC-7(21) Isolation of ComponentsComponent isolationSIS separation from the rest of OT
AC-4 Information Flow EnforcementAuthorized flow enforcementDPI rules controlling OT commands
AC-4(7) One-way FlowHardware unidirectional flowData diodes (Waterfall, Owl)
SC-3 Security Function IsolationSecurity function isolationSeparate zone for SIS
CA-3 Information ExchangeInformation exchange managementIEC 62443 conduits

Source: NIST SP 800-53 Rev. 5 “Security and Privacy Controls for Information Systems and Organizations.”

Implementation Process - Step by Step

  1. Asset inventory - passive asset discovery (Nozomi, Claroty) without active scanning
  2. Risk assessment and zone definition - grouping assets into zones, assigning SL-T
  3. Conduit definition - permitted protocols, direction, control mechanism. Default: deny all
  4. Incremental deployment - starting with the most critical zones (SIS), gradual expansion
  5. Monitoring and validation - verifying that traffic complies with zone policy

Legacy environment challenges: lack of authentication in older PLCs (e.g., Siemens S7-300), flat networks in 10+ year installations, downtime risk during topology changes, temporary vendor remote access that is never removed.

Segmentation Readiness Checklist

Before starting a segmentation project, verify organizational readiness across five areas corresponding to implementation stages. The table below serves as a progress tracking tool - the “Status” column allows marking which elements are already in place and which require work.

StageElementStatus
1. InventoryComplete list of OT assets (PLCs, HMIs, engineering workstations, servers, network devices)
Documentation of network connections and data flows
Identification of communication protocols (Modbus TCP, OPC UA, DNP3, EtherNet/IP, S7comm)
List of remote access connections (VPNs, vendor service tunnels)
Passive monitoring tool deployed for asset discovery
2. Risk assessment and zone definitionSecurity zones defined (IEC 62443-3-2)
Target Security Levels (SL-T) assigned to each zone
Conduits between zones identified
Impact assessment of losing access to each zone on production
3. Conduit definitionZone-to-zone flow matrix completed for all zone pairs
Permitted protocols and communication direction defined per conduit
Default deny-all policy confirmed
Firewall and ACL rules prepared for deployment
4. Incremental deploymentMaintenance windows agreed for implementing changes
Rollback plan prepared
Operators informed and trained
Deployment order established - starting with most critical zones (SIS)
5. Monitoring and validationPassive monitoring verifying traffic compliance with zone policy
Firewalls with OT protocol support deployed at zone boundaries
Centralized security event logging (SIEM or log collector)
Incident response procedures defined per zone

Passive OT Network Monitoring Tools

Segmentation without monitoring is half the job - you cannot know whether network traffic complies with zone policy or whether unauthorized devices have appeared. Passive monitoring tools listen to traffic without interfering with production systems and provide asset inventory, anomaly detection, and vulnerability identification.

ToolVendorKey Features
Guardian / VantageNozomi NetworksPassive monitoring, asset inventory, anomaly detection
CTD / xDomeClarotyAsset visibility, vulnerability management, secure remote access
PlatformDragosThreat detection, ICS-specific threat intelligence
OT SecurityTenable (formerly Indegy)Asset discovery, risk-based vulnerability management
Defender for IoTMicrosoft (formerly CyberX)Agentless monitoring, Microsoft Sentinel integration

Conclusion

OT network segmentation is not a one-time project - it is a continuous improvement process. The Purdue Model provides the vocabulary, IEC 62443-3-2 provides the method (zones and conduits), and passive monitoring tools provide visibility.

The key is a pragmatic approach: asset inventory, risk assessment, incremental deployment, and continuous monitoring. Every step toward segmentation reduces risk and gives security teams time for detection and response.

NOTE

Data from the Dragos 2026 OT Cybersecurity Year in Review confirms that organizations with full OT visibility detected and contained ransomware incidents in an average of 5 days - compared to the industry average of 42 days. Visibility and segmentation work together: without asset inventory you do not know what to segment, and without segmentation even good visibility will not stop an attacker’s lateral movement.

Sources

Need help in this area?

Our experts will help you assess the risk and plan next steps.

Talk to an expert

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert