Industrial Control Systems (ICS) were initially designed for longevity and physical safety, not network security. As IT and OT (Operational Technology) converge, legacy PLC protocols—often lacking authentication—are being exposed to modern threats. Defending these systems requires a multi-layered approach that prioritizes **deterministic physical integrity** over simple data confidentiality.

1. The Purdue Model: Defense-in-Depth Architecture

The **Purdue Model** (ISA-95) remains the single most important architectural blueprint for industrial security. Its power lies in segmentation: creating logical boundaries between the messy, unpatchable reality of the factory floor and the hyper-connected, vulnerable nature of corporate IT.

Purdue Model Architecture

ISA-95 Industrial Segmentation

Security Mode:
Level 5: Enterprise Network
Internet, Corporate IT, ERP
Level 4: Site Business Planning
Scheduling, Inventory
Level 3.5: IDMZ (Demilitarized Zone)
Security Buffer, Patch Server
Level 3: Site Operations
Historians, HMI, Domain Controller
Level 2: Area Control
SCADA Master, HMI
Level 1: Basic Control
PLC, RTU, Controllers
Level 0: Physical Process
Sensors, Motors, Pumps, Valves

Traffic Simulation

Telemetry (Data)ALLOWED
Remote CommandVULNERABLE

Standard Firewall Rules

Software-based security. Firewalls rely on Access Control Lists (ACLs). If a hacker finds a zero-day vulnerability in the firewall firmware or misconfiguration, they can traverse from Level 5 (Internet) down to Level 1 (Controllers).

2. IEC 62443: Security Levels (SL) & Foundational Requirements (FR)

The **IEC 62443** standard provides a framework for measuring the security capability of a system. It defines four **Security Levels (SL)** based on the sophistication of the potential attacker, underpinned by seven **Foundational Requirements (FR)**.

Foundational Requirement (FR)Technical DescriptionSL-3/4 Objectives
FR 1: IACIdentification & Access ControlHardware-based MFA for local and remote users.
FR 2: UCUse ControlSession limits, account lockouts, and strict RBAC.
FR 3: SISystem IntegritySecure Boot, code signing, and memory protection.
FR 4: DCData ConfidentialityEncryption of sensitive config data and passwords.
FR 5: RDFRestricted Data FlowOne-way data diodes and air-gapped zone isolation.
FR 6: TRETimely Response to EventsContinuous monitoring (NDR) and tamper-proof logs.
FR 7: RAResource AvailabilityDoS resilience, high-availability (PRP/HSR), and offline backups.

3. Network Segmentation: Zones & Conduits

Following **IEC 62443**, industrial networks must be divided into **Zones** (functional clusters) connected by **Conduits** (controlled communication paths).

Share Article

Technical Standards & References

NIST (2022)
NIST SP 800-82 Rev.3: Guide to Industrial Control Systems Security
VIEW OFFICIAL SOURCE
ISA Global (2023)
ISA/IEC 62443: Industrial Automation and Control Systems Security
VIEW OFFICIAL SOURCE
ISA (2021)
Purdue Enterprise Reference Architecture
VIEW OFFICIAL SOURCE
CISA (2023)
CISA Recommended Practices for ICS Security
VIEW OFFICIAL SOURCE
Mathematical models derived from standard engineering protocols. Not for human safety critical systems without redundant validation.

Related Engineering Resources