Securing remote access for legacy PLCs is the critical, often overlooked, frontier in industrial cybersecurity. This guide reveals a practical, defense-in-depth strategy to protect your vital assets without a full-scale rip-and-replace.


Cybersecurity Matters

OT Network Segmentation:
Replacing the Air Gap Myth with Defensible Architecture

When Every Door is Open: The Urgent Case for OT Network Segmentation

That single network breach in your business system just became a plant-wide shutdown. In a flat network, nothing contains the damage.

The air gap is dead. Data must flow from sensor to cloud, ERP to MES, creating connections that attackers eagerly exploit. When every device can talk to every other device, a compromise in one area spreads like wildfire through your entire operation. Network segmentation isn't just another security project - it's the architectural foundation that determines whether an incident remains contained or becomes catastrophic.

The Anatomy of a Flat Network Failure

Consider what unfolded at a global food processor last quarter. An accountant in the finance department clicked a phishing link, introducing ransomware that encrypted shared drives. Within hours, the infection spread to the manufacturing execution system, then to HMIs, and finally to PLCs controlling refrigeration units. The result? $1.2 million in spoiled product and eleven days of production downtime.

The investigation revealed the root cause: a completely flat network architecture where the accounts payable department could communicate directly with process controllers. No barriers, no filters, no oversight.

This pattern repeats across industries because flat networks create three fundamental vulnerabilities:

Cybersecurity Matters

Unrestricted Lateral Movement
Once an attacker gains initial access - often through a seemingly low-value target like a shared printer or an engineer's workstation - they can pivot freely to critical control systems. There are no internal boundaries to slow their progress or trigger detection.
Blast Radius Maximization
A single vulnerability anywhere becomes a vulnerability everywhere. That unpatched Windows 7 HMI in packaging can serve as the entry point to compromise your entire safety instrumented system. The attack surface isn't just your perimeter - it's every connected device.
Impossible Monitoring and Control
When thousands of devices communicate unpredictably, establishing behavioural baselines becomes meaningless. Distinguishing legitimate traffic from malicious activity is like identifying a single conversation in a stadium roar. Security teams drown in noise while real threats pass unnoticed.

Beyond the Firewall: The Industrial DMZ Architecture

The solution begins with recognizing that IT and OT networks have fundamentally different requirements. You cannot simply extend enterprise security policies into industrial environments. The Industrial Demilitarized Zone (IDMZ) creates a controlled intermediary space that enables necessary data exchange while preventing direct access.

Think of the IDMZ not as a barrier, but as a secure translation layer. It performs three critical functions:

Protocol-Aware Brokerage
The IDMZ contains data historians and protocol gateways that collect information from the OT network and make it available to IT systems. ERP systems don't query PLCs directly - they request data from historians in the DMZ. This preserves the isolation of control systems while enabling business visibility.
Controlled Service Provisioning
When patches, updates, or remote support need to reach OT systems, they're staged through the DMZ. Files are scanned for malware, authenticated for legitimacy, and then transferred through approved channels. This eliminates direct internet-to-control-system connections.
Session Termination and Inspection
All cross-domain communications terminate in the DMZ. A connection from the corporate network never extends directly into the control network. This allows for deep inspection, logging, and enforcement of security policies without impacting real-time control traffic.

The Precision of Microsegmentation

While the IDMZ protects the OT network as a whole, microsegmentation protects assets from each other. This is where you move from broad zones to precise, application-aware boundaries.

Microsegmentation operates on a simple principle: devices should only communicate with what they absolutely need to. Consider these practical implementations:

Process-Cell Isolation
Your batch reactor control network has no legitimate reason to communicate with packaging line controllers. By segmenting these process cells, you ensure that a malware infection in one area cannot spread to others. Production can continue in unaffected areas while containing the incident.
Role-Based Communication Paths
An HMI needs to read from specific PLCs but should never initiate writes to safety controllers. A historian needs to collect data but shouldn't be able to modify setpoints. Microsegmentation enforces these communication rules at the network layer, creating technical enforcement of operational policies.
Temporal Segmentation
Some communications only need to occur during specific time windows. Maintenance workstations might require broader access during shutdowns but should be restricted during normal operations. Dynamic segmentation policies can adapt to these changing requirements without compromising security.

Building Your Segmentation Foundation

Implementing effective segmentation requires more than just deploying firewalls. The most successful programs follow a deliberate methodology:

Cybersecurity Matters

1. Asset and Communication Discovery
Before building walls, you must understand the landscape. This is where your asset visibility work pays dividends. Comprehensive communication mapping reveals which devices actually need to talk to each other - often uncovering surprising connections that have persisted long after their operational purpose ended.
2. Risk-Based Zoning Strategy
Not all segments are created equal. Prioritize isolation based on criticality and risk. Safety systems, environmental controls, and revenue-critical processes deserve the highest levels of protection. The segmentation strategy should reflect your operational risk assessment, not just technical convenience.
3. Industrial-Grade Enforcement Points
Not all firewalls are suitable for OT environments. Industrial segmentation requires devices that understand proprietary protocols, can operate in harsh conditions, and won't introduce latency into time-sensitive communications. The enforcement mechanism must fit the operational reality.
4. Change Management Integration
Segmentation isn't a one-time project - it's an ongoing discipline. Your network architecture must accommodate legitimate changes while maintaining security. This requires integrating segmentation policies into your management of change processes, ensuring new devices and applications don't recreate the flat network by accident.

The Operational Dividend

While security drives segmentation initiatives, the operational benefits often deliver unexpected value:

Incident Containment
When a malware infection occurs - and statistics show it's a matter of when, not if - segmentation limits the damage. Instead of a plant-wide shutdown, you might have a single line or process cell affected. The difference between a catastrophic event and a manageable incident.
Network Performance and Stability
By eliminating unnecessary cross-talk and broadcast traffic, segmentation actually improves network performance and predictability. Control systems operate more reliably when they're not competing with non-essential traffic for bandwidth.
Compliance and Audit Efficiency
Regulatory frameworks like NERC CIP and IEC 62443 explicitly require segmentation for critical systems. A well-documented segmentation strategy demonstrates due diligence and simplifies compliance reporting.

One chemical manufacturer discovered an unexpected benefit after implementing microsegmentation: their network troubleshooting time decreased by 60%. With clearly defined communication paths and isolated failure domains, engineers could pinpoint problems faster and with greater confidence.

Answers to some Frequently Asked Questions

These cross a persons mind at some stage ...


Modern industrial firewalls and segmentation gateways are designed specifically for this challenge. When properly configured, they introduce microsecond-level latency that's negligible for even the most sensitive control loops. The key is selecting industrial-grade equipment that processes traffic at wire speed and understanding your specific timing requirements during the design phase.

This often reveals either misconfigured applications or unnecessary communication patterns. Start by working with vendors to understand minimum required access - you'll often discover that applications request broad access but actually need specific ports and protocols. For legacy systems that genuinely require wide access, consider placing them in their own segmented zone with additional monitoring and controls.

Proper segmentation actually simplifies troubleshooting by reducing the "noise" in network communications. The key is providing operations teams with the visibility and tools they need within their segments. Documented network diagrams, clear communication matrices, and proper monitoring access ensure that segmentation enables rather than hinders operational effectiveness.

Absolutely. Segmentation is particularly valuable in mixed environments because it allows you to isolate legacy systems that may be inherently less secure. Legacy equipment can be placed in specially configured segments with additional monitoring and restricted communication paths. This approach often extends the usable life of legacy assets by protecting them from modern threats.

Segmentation should be designed to support, not hinder, your redundancy strategies. Critical communication paths for redundancy protocols like PRP and HSR must be identified and allowed through segmentation boundaries. The good news is that industrial security equipment now includes native support for these protocols, ensuring that security and reliability work together rather than in opposition.

A phased approach typically delivers the best results. Start with the Industrial DMZ to secure the IT/OT boundary, then focus on segmenting your most critical systems. A complete segmentation of a mature facility might take 12-18 months, but significant risk reduction can be achieved in the first 90 days by addressing the highest-priority boundaries.

From Flat Network to Fortified Architecture

Continuing with flat network architecture in today's threat environment is a choice - a choice to accept unlimited blast radius for every security incident. The technical approaches and technologies to implement effective segmentation are proven and available.

Subscribe to the Link & Layer | Smart Learning Hub to receive our "OT Segmentation Design Package," including architecture templates, vendor-neutral technology comparisons, and communication matrices that transform segmentation from theoretical concept to implemented reality.

Don't wait for an incident to reveal the cost of every door being open. Build your walls where they matter most.




You May Also Be Interested In ...

Cybersecurity Matters
Securing Third-Party Remote Access: Neutralizing the #1 Attack Vector in Industrial Networks

Unsecured vendor RDP and VPNs are the primary entry for ICS attacks. Discover how to implement zero-trust remote access that enables experts without exposing your control network

Cybersecurity Matters
Protocol-Level Vulnerabilities: Securing Industrial Communications at the Foundation

Modbus, PROFINET and EtherNet/IP lack basic security. Discover how protocol-aware monitoring and deep packet inspection protect against command injection and spoofing attacks

Cybersecurity Matters
The Human Firewall: Mitigating Insider Threats in OT Environments

Your technical controls are only as strong as your people. Learn how to build a human firewall against social engineering and insider threats in industrial operations