Purdue Model levels

Purdue Model Levels: Detailed Breakdown

The Purdue Enterprise Reference Architecture (PERA), widely known as the Purdue Model, is a hierarchical framework for Industrial Control Systems (ICS) and Operational Technology (OT) networks. Developed in the 1990s for manufacturing, it remains the gold standard in 2026 for secure IT/OT segmentation (referenced in ISA/IEC 62443, NIST SP 800-82, and DoD guidance). It organizes systems into levels based on function, time criticality, and security needs, enforcing boundaries to protect real-time processes from enterprise risks.

Standard Levels

LevelNameDescriptionTypical ComponentsTime CriticalitySecurity Focus
0Physical ProcessThe actual industrial process and equipment.Sensors, actuators, valves, motors, drives.MillisecondsPhysical safety; isolate from networks.
1Sensing & ManipulatingBasic real-time control of equipment.PLCs, RTUs, controllers, VFDs.Milliseconds to secondsDevice hardening; cell-level isolation.
2Monitoring & SupervisingLocal process monitoring and supervisory control.Core OT zone: restrict external access.SecondsPhysical safety: isolate from networks.
3Operations ManagementSite-level manufacturing operations and control.MES, production historians, patch management servers, workflow tools.Minutes to hoursIntra-site OT; firewall boundaries.
3.5Industrial Demilitarized Zone (IDMZ)Secure buffer between OT and IT (added best practice).Proxy servers, mirrored historians, broker services, jump hosts.N/ANo direct IT-OT traversal; session termination.
4Business Planning & LogisticsEnterprise business systems.ERP, scheduling, inventory, supply chain systems.Days to weeksStandard IT security; read-only OT data.
5EnterpriseCorporate-wide functions.Email, finance, internet access, corporate apps.VariablePerimeter IT defenses; no OT access.

Key Principles

  • Hierarchical Flow: Data flows primarily upward (monitoring/telemetry); control commands flow downward sparingly and securely.
  • Segmentation: Firewalls/VLANs/unidirectional diodes between levels; strict rules at boundaries (especially Level 3.5 IDMZ).
  • Modern Relevance: Still foundational for Mining 4.0/IIoT; cloud/edge devices map to higher levels via secure conduits.

The Purdue Model ensures defense-in-depth, prioritizing OT availability and safety while enabling secure data sharing for analytics/digital twins. Implementation starts with mapping assets to levels, then enforcing boundaries (e.g., IDMZ for safe convergence).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top