In a Nutshell

Unlike commercial IT networking, Industrial Operational Technology (OT) prioritizes safety and uptime over confidentiality. This guide provides the framework for deploying robust SCADA networks across factory floors, utility sites, and remote infrastructure nodes using the Purdue Model of logical separation, with attention to the specific protocol vulnerabilities that make industrial networks unique attack and failure targets.

IT vs. OT: The Priority Inversion

In a standard office network, the primary goal is protecting the data (Confidentiality). In a SCADA (Supervisory Control and Data Acquisition) environment, the primary goal is protecting the machine and the human operator (Safety). This creates a fundamental inversion of the standard CIA triad.

IT vs. OT Priority Spectrum

Comparing Commercial vs. Industrial Success Metrics

IT: The CIA Triad
  • Confidentiality: Encrypt all data.
  • Integrity: Prevent unauthorized change.
  • Availability: Business continuity.
OT: The SRP Model
  • Safety: Protect human life/machine.
  • Reliability: Deterministic performance.
  • Productivity: OEE and output volume.
ENTERPRISE (L4)
PURDUE MODEL
PROCESS (L0)
Protocol: TCP, HTTP/S, SMTP
Intermediary: OPC UA, MQTT
Control: Modbus, EtherNet/IP, PROFINET

The Purdue Model (Hierarchy of Control)

To secure industrial sites, we use the Purdue Enterprise Reference Architecture (PERA). This divides the network into logical levels:

  • Level 0 (Physical Process): Sensors, actuators, and motors. Communication is typically 4-20mA analog or Fieldbus (HART, Profibus-DP).
  • Level 1 (Basic Control): PLCs (Programmable Logic Controllers) and RTUs. These execute the safety logic and process interlocks.
  • Level 2 (Area Supervisory): HMI terminals and engineering workstations. Operators monitor and adjust processes from this layer.
  • Level 3 (Site Operations): Historians (OSIsoft PI, AspenTech) and local site management servers aggregate process data.
  • Level 3.5 (DMZ): The firewall barrier between the factory network and the office network. No direct routing across this boundary should exist.
  • Level 4/5 (Business): The enterprise IT network, ERP systems (SAP), and cloud services.

The Purdue Model (PERA)

ISA-95 Logical Segmentation Hierarchy

Security By Design

Level dmz

Key Assets
Common Protocols
Primary Security Risk

Compliant with ISA/IEC 62443 Standards
IT (Enterprise) Network
Security Barrier (DMZ)
OT (Process) Network

SCADA Protocols: Modbus, DNP3, and PROFINET

Old SCADA protocols were designed for serial lines and have zero built-in security features. When wrapping these in Ethernet (Modbus TCP, DNP3 over TCP), they become highly vulnerable to spoofing and replay attacks.

ProtocolTypical UseSecurity LevelEncryption
Modbus TCPGeneral automation, sensorsNoneNone
DNP3Utilities, SCADA RTUsOptional SAv6Optional
PROFINETFactory automation (Siemens)Built-in GSDNone (IRT)
OPC UACross-vendor integration, Level 3-4Full PKITLS 1.2+

The ISA/IEC 62443 standard mandates that any protocol crossing a zone boundary must be wrapped in an encrypted, authenticated transport. For legacy protocols like Modbus that cannot support encryption natively, the recommended approach is to deploy a Protocol Gateway at the DMZ that translates Modbus to OPC UA, providing security at the zone boundary rather than at the device level.

Handover Checklist

  • [ ] Verified all switches are Industrial-Grade (DIN-rail mount, Extended Temp Range -40┬░C to +70┬░C).
  • [ ] Confirmed no direct internet routing to Level 0•ô3 assets (verified by firewall ACL review).
  • [ ] Documented all Modbus register maps, IP addresses, and polling intervals in the Network As-Built drawing.
  • [ ] Tested redundant ring recovery (REP or MRP) under 50ms following IEEE 62439-2 requirements.
  • [ ] Confirmed all Level 0•ô1 field instruments are powered from isolated 24VDC SELV sources.
  • [ ] Validated that historian can receive data across the DMZ without requiring any open inbound ports from the plant network.
Share Article

Technical Standards & References

NIST (2022)
NIST SP 800-82 Rev.3: Guide to Industrial Control Systems Security
VIEW OFFICIAL SOURCE
ISA Global (2023)
ISA/IEC 62443: Industrial Automation and Control Systems Security
VIEW OFFICIAL SOURCE
IEC (2021)
IEC 61850: Communication Networks in Substations
VIEW OFFICIAL SOURCE
CISA (2023)
OT Security Best Practices Guide
VIEW OFFICIAL SOURCE
Mathematical models derived from standard engineering protocols. Not for human safety critical systems without redundant validation.

Related Engineering Resources