One question continually arises in customer discussions: "How much segmentation is enough?”.
In the IEC 62443 framework, the concept of Zones and Conduits forms the basis of network segmentation. Going from a flat network to a segmented network is a recurring nightmare for OT CIOs/CISOs, as using IT-oriented solutions results in significant downtime, re-architecture, and expense.
IEC 62443 emphasizes the importance of keeping the zones and conduits consistent with their network architecture to avoid complexity, but the architecture is based on the Purdue model. We see many manufacturing networks today that need to be migrated to the Purdue model, and making that shift is a significant project by itself without even considering internal segmentation.
The process of managing risk is at the core of all cybersecurity decisions, and IEC 62443 defines target security levels that are part of the decision-making process for network segmentation. The standard provides three levels of SLs:
In this webinar, we will examine the IEC’s concepts of zones and conduits and outline what makes sense based on the risks for each security level. Delivering the right level of segmentation without a massive disruption to your network has proven to be one of the top items on OT network administrator’s minds going into 2025.
Sign up for our Webinar, "Reducing Risk with IEC 62443’s Network Segmentation," on January 15th at 1 p.m. ET - https://www.linkedin.com/events/reducingriskwithiec62443-snetwo7274762217470709761/
Experience the simplicity of BlastShield to secure your OT network and legacy infrastructure.