Skip to content

1.5 OT network & cybersecurity baseline

A flat network significantly increases risk. If a receptionist’s laptop opens a phishing email, it is critical that the PLCs continue to operate safely. The primary goal of OT Cybersecurity goes beyond simple “IT Compliance”; it is about ensuring Production Survivability. Network segmentation is essential to contain the potential impact of inevitable breaches.

A strict segmentation model (modified Purdue Model) must be adhered to. Systems must be isolated based on function, not location.

  • Risk Profile: High (Email, Web, Phishing).
  • Connectivity: Internet Access Allowed.
  • Risk Profile: Medium (Proxy services, Gateways).
  • Connectivity: The only bridge between Enterprise and Plant.

Level 3: operations VLAN (MES/SCADA servers)

Section titled “Level 3: operations VLAN (MES/SCADA servers)”
  • Risk Profile: Low.
  • Connectivity: No Internet. Talk only to DMZ and Level 2.

Level 0-2: control VLAN (PLCs, HMIs, robots)

Section titled “Level 0-2: control VLAN (PLCs, HMIs, robots)”
  • Risk Profile: Critical.
  • Connectivity: Local connections only. Block Default Gateway.
  • When traffic originates from Level 4 (Enterprise) and targets Level 0-2 (PLC), the firewall should drop the packet immediately. A fundamental principle of this architecture is that the ERP finance module does not require a direct connection to a servo motor.
  • When the MES needs data from the ERP, it should utilize a controlled push/pull mechanism via a DMZ Proxy. Direct routing is not recommended.

The DMZ is not a router; it is a termination point. Traffic must not “pass through” the DMZ; it must break the session.

  • Placement: Architecturally or logically between the IT Firewall and the OT Firewall.
  • Rule: No common protocols (SMB/RPC) allowed to cross the DMZ.
  • Mechanism: A “Protocol Break” must be used.
    • Bad: Routing database traffic (port 1433) from L4 to L3.
    • Good: L3 pushes JSON to a Message Broker in DMZ; L4 subscribes to Broker.

Pro-Tip: If a system or equipment vendor specifies that their software requires a flat network or direct internet access to the PLC, this introduces a significant security liability. It is advisable to isolate that equipment in a dedicated “Dirty VLAN” with strict firewall rules.

Remote access is the primary vector for ransomware. “Shadow IT” tools like TeamViewer or AnyDesk must be eliminated immediately.

  • Location: Resides in the DMZ.
  • Access: RDP/SSH only.
  • Control: Multi-Factor Authentication (MFA) should be considered Mandatory.
  • Data Hygiene: Block Clipboard and File Transfer capabilities. If code or files need to be transferred, pass them through a separate “Decontamination Station” for scanning first.

Vendors do not permanently reside on the network. Access should be treated as temporary and controlled.

  1. No Always-On VPNs.
  2. Request Protocol: The Vendor requests a specific access window (e.g. Tuesday 14:00 - 16:00).
  3. Approval: The OT Manager enables the account for that approved duration only.
  4. Surveillance: When a vendor connects to a critical system, the architecture should support a “Shadow Session” (allowing an internal engineer to actively monitor the screen for oversight).
  5. Termination: The account should automatically disable at the precise end of the approved window (e.g. 16:01).

What cannot be seen cannot be defended. Logging must be enabled to detect the “pre-attack” reconnaissance.

  • Firewall Deny Logs: A sudden spike in “Deny” traffic frequently indicates an infected host scanning the network for open ports. Configuring alerts for this specific behavior is essential.
  • Auth Failures: Configure the system to trigger a high-priority alert (e.g. Severity 1) when there are three or more failed login attempts on a Jump Host.
  • PLC Mode Changes: When a PLC’s key switch is changed from “Run” to “Program” remotely, the system should trigger an immediate alarm. This action is often a signature of sophisticated attacks (resembling Stuxnet).

Final Checkout: Ot network & cybersecurity baseline

Section titled “Final Checkout: Ot network & cybersecurity baseline”
CategoryMetric / ControlThreshold / Rule
SegmentationVLAN Leakage0 direct routes from L4 (Office) to L2 (PLC)
DMZProtocol BreakNo direct TCP sessions pass through DMZ
AccessMFA Coverage100% of Remote Access requires Token/App
VendorsVPN StateDefault State = Disabled (On-demand only)
SoftwareBlacklistTeamViewer, AnyDesk, VNC blocked at Gateway
LoggingRetentionFirewall Logs retained for ≥ 90 Days
RecoveryConfig BackupNetwork Switch configs backed up weekly