Purdue Model segmentation details

ICS Security: The Purdue Model | Claroty

claroty.com

What Is the Purdue Model for ICS Security? | A Guide to PERA ...

paloaltonetworks.com

What Is the Purdue Model for ICS Security

bxc-security.com

Purdue Enterprise Reference Architecture | Download Scientific Diagram

researchgate.net

Understanding Industrial DMZ (L3.5) in the Purdue Model

linkedin.com

Level 3.5 – The Industrial Demilitarized Zone - Industrial ...

oreilly.com

Purdue Model Segmentation Details

The Purdue Enterprise Reference Architecture (PERA), commonly known as the Purdue Model, is a hierarchical framework developed in the 1990s for computer-integrated manufacturing and widely adopted for Industrial Control Systems (ICS) and Operational Technology (OT) network segmentation. It guides secure IT/OT convergence by dividing networks into functional levels, enforcing strict boundaries to prevent threats from spreading (e.g., ransomware from IT to critical processes). Referenced in standards like ISA/IEC 62443, NIST SP 800-82, and CISA guidelines, it remains foundational in 2026 despite IIoT/Industry 4.0 evolutions.

Core Levels and Segmentation Principles

The model organizes systems from physical processes to enterprise IT, with firewalls, VLANs, access controls, and unidirectional data flows between levels. Data typically flows upward (monitoring), while control flows downward are minimized/restricted.

LevelNameDescriptionTypical ComponentsSegmentation Controls
0Physical ProcessSensors/actuators interacting with the environment.Valves, motors, drives, field devices.Air-gapped or unidirectional diodes; no direct external access.
1Basic ControlReal-time control devices.PLCs, RTUs, controllers.Isolated cells; protocol whitelisting.
2Supervisory ControlMonitoring and local control.SCADA servers, HMIs, alarm systems.Firewall to lower levels; restricted inbound.
3Operations ManagementSite-level functions.Historians, MES, patch management.Internal OT firewall; limited to Level 2 traffic.
3.5Industrial Demilitarized Zone (IDMZ)Buffer zone between OT and IT.Proxy servers, mirrored historians, file shares.Dual firewalls (no direct traversal); terminates all IT-OT sessions.
4Business LogisticsEnterprise planning.ERP, scheduling systems.Enterprise firewall; read-only data from IDMZ.
5EnterpriseCorporate functions.Email, internet, business apps.Fully separated; no direct OT access.
  • Key Rule: No direct traffic from IT (Levels 4-5) to core OT (Levels 0-3); all cross-boundary communication terminates in the IDMZ.
  • Traffic Direction: Primarily one-way upward via data diodes or replication; downward only for approved commands.

Industrial DMZ (Level 3.5) Details

Introduced as a best practice enhancement, the IDMZ prevents direct IT-OT connections:

  • Acts as a “neutral zone” with services like antivirus updates, historian mirrors, or remote access proxies.
  • Enforced by firewalls on both sides: OT firewall blocks outbound except to IDMZ; IT firewall blocks inbound except responses.
  • Critical for containing breaches (e.g., Norsk Hydro 2019 incident highlighted poor segmentation risks).

Modern Adaptations (2026 Context)

  • IIoT/Cloud Integration: Purdue remains relevant; edge devices map to Levels 0-2, cloud to higher levels with secure conduits.
  • Zero-Trust Overlay: Micro-segmentation within levels (e.g., per-PLC policies) complements macro boundaries.
  • Challenges: Legacy flat networks; IIoT hyper-connectivity requires enhanced conduits/zones per IEC 62443.

The Purdue Model ensures defense-in-depth, prioritizing OT availability/safety while enabling secure data flows for Mining 4.0 analytics and digital twins. Implementation starts with visibility, then macro-segmentation (IT/OT split + IDMZ), progressing to micro.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top