IT/OT Network Separation for Greenfield Factories in 2026

By Jacob bethell on March 19, 2026

it-ot-network-separation-greenfield-factory-2026

YouTube on the control network equals a robot missing a critical signal. A flat factory network where corporate email, SCADA control, AI vision, and IoT sensor data share the same infrastructure is a guaranteed path to both performance failures and security breaches. Mixed networks cause packet collision (delayed robot commands, HMI freezes) and create attack surfaces where ransomware jumps from an office laptop to production controllers in seconds. The average cost of a cyberattack on an unsegmented manufacturing network: $4.4M in damages, plus weeks of production loss. In 2026, the fastest-growing threat vector in manufacturing isn't sophisticated nation-state attacks — it's basic network hygiene failures that greenfield design eliminates entirely. We design physically separated IT/OT networks with VLAN segmentation, industrial firewalls, DMZ zones, and IEC 62443 compliance from the build phase — so your production network is isolated, deterministic, and defended from day one. Secure Your Factory Network

Purdue Model: IT/OT Separation Architecture
IT Zone
L5EnterpriseEmail, internet, corporate apps
L4Business PlanningERP, CRM, supply chain
L3.5Industrial DMZFirewalls, jump servers, historian replication, data diodes — zero direct IT↔OT
OT Zone
L3Site OperationsMES, historian, OT services
L2Supervisory ControlSCADA, HMI, engineering workstations
L1Basic ControlPLCs, RTUs, safety controllers
L0Physical ProcessSensors, actuators, motors, valves
Greenfield design enforces physical and logical separation at every boundary from construction

What Happens Without Separation

Ransomware: IT → OT in 90 Seconds

A phishing email opens a backdoor on a corporate PC. Without network segmentation, the malware traverses from Level 5 directly to Level 2 SCADA and Level 1 PLCs. Production stops. Safety systems compromised. Recovery takes weeks. Average manufacturing ransomware cost: $4.4M. Greenfield fix: industrial DMZ with firewalls and data diodes at Level 3.5 — zero direct IT-to-OT path exists.

Bandwidth Collision: ERP Chokes SCADA

MES pushes a 500 MB batch report to ERP across the same switches that carry PLC scan traffic. SCADA response spikes from 10ms to 300ms. HMI screens freeze. Operators lose real-time visibility during a critical process step. Greenfield fix: dedicated SCADA VLAN with QoS priority (DSCP EF) — OT traffic is never competing with business data.

Vendor Backdoor: Uncontrolled Remote Access

Equipment vendor installs a cellular router directly on a machine for remote support — bypassing all firewalls and security controls. This creates an unmonitored backdoor from the public internet directly into the control network. Greenfield fix: all vendor remote access routed through DMZ jump server with multi-factor authentication, session recording, and time-limited access.

Lateral Movement: Flat L2 Network

Firewalls separate Level 3 from Level 2, but within Level 2 everything is flat — every HMI, PLC, and engineering workstation can reach every other. One compromised HMI gives an attacker access to every controller on the floor. Greenfield fix: micro-segmentation within OT zones using IEC 62443 zone/conduit model — not just Purdue level boundaries.

Building a new factory and want IT/OT separation done right from day one? Secure Your Factory Network — we deliver Purdue-aligned, IEC 62443-compliant network architecture as construction-ready documentation.

Level-by-Level Design Specification

Purdue LevelSystemsNetwork TypeSecurity ControlsGreenfield Design
L5: EnterpriseEmail, internet, corporate apps, cloudStandard IT Ethernet/WiFiCorporate firewall, endpoint protection, NACPhysically separate cable plant from all OT; standard IT design
L4: BusinessERP (SAP), CRM, supply chain, BIIT LAN with server VLANApplication firewall, database security, access controlSeparate server room or cloud; no direct OT network connections
L3.5: DMZJump servers, historian replica, OPC broker, remote access gatewayDual-homed firewalled zoneIndustrial firewall (Fortinet/Palo Alto), data diode for one-way flow, IDS/IPSDedicated DMZ rack in server room; dual firewall (IT-facing + OT-facing)
L3: Site OperationsMES, historian, patch server, AV server, OT backupOT managed Ethernet (dedicated)OT firewall, application whitelisting, OT-specific AV, network monitoringOT server rack separate from IT; dedicated OT VLAN trunk to L2 switches
L2: SupervisorySCADA servers, HMI, engineering workstationsIndustrial managed EthernetMicro-segmentation per cell/zone; USB lockdown; no internet accessIndustrial switches per production zone; fiber uplinks to L3
L1: ControlPLCs, RTUs, DCS controllers, safety PLCsIndustrial Ethernet (EtherNet/IP, PROFINET)Static IPs; no DHCP; ACLs on switch ports; protocol-specific filteringDedicated control VLAN per machine cell; no routing to L4/L5
L0: ProcessSensors, actuators, drives, valves, I/O modulesFieldbus or industrial EthernetPhysical isolation; no IP connectivity to higher levelsHardwired or fieldbus to L1 controller only; no direct network access

Zone & Conduit Architecture (IEC 62443)

While Purdue describes where systems live, IEC 62443 defines how they must be protected. IEC 62443-3-2 introduces zones (groups of assets with common security requirements) and conduits (controlled communication paths between zones). This risk-driven approach goes beyond Purdue's static levels — grouping assets by criticality and function, not just hierarchy.

SL-3

Safety Zone

Safety Instrumented Systems (SIS), emergency shutdown (ESD), fire and gas. Physically isolated from all other zones. No remote access. Separate power supply. Highest security level — protection against intentional attacks using sophisticated means.

SL-3

Control Zone

PLCs, DCS controllers, and their associated I/O. One zone per production cell or process unit. Conduits to supervisory zone only — no direct path to enterprise. Protocol-specific filtering on conduit boundaries (allow EtherNet/IP CIP; block all else).

SL-2

Supervisory Zone

SCADA servers, HMI stations, engineering workstations. Conduits to control zone (read/write) and to operations zone (read-only). Application whitelisting on all workstations. USB ports disabled. No internet browser installed.

SL-2

Operations Zone

MES, historian, OT patch management, backup servers. Conduit to supervisory (data collection) and to DMZ (historian replication). OT-specific antivirus and endpoint detection. Controlled update mechanism for patches.

SL-1

DMZ Zone

Buffer between IT and OT. Hosts jump servers for remote access, historian replicas for business reporting, and OPC UA brokers for data exchange. Dual-firewall boundary (IT-facing and OT-facing). No system in the DMZ has simultaneous connections to both IT and OT.

SL-1

Enterprise Zone

Standard corporate IT: ERP, email, internet. Receives production data from DMZ historian replica only — never from OT directly. Standard IT security stack: next-gen firewall, endpoint detection, SIEM, identity management.

Secure Remote Access Architecture

1
Vendor Authenticates via MFA

Vendor connects to remote access gateway in the DMZ via encrypted VPN. Multi-factor authentication (hardware token + password) required. Identity verified against approved vendor list with time-limited access window.

2
Jump Server in DMZ

Vendor accesses a hardened jump server — never connects directly to OT systems. The jump server provides RDP or VNC to specific approved targets only. No file transfer, no clipboard sharing, no USB passthrough unless explicitly approved.

3
Session Recording & Monitoring

Every keystroke, screen, and command is recorded for audit trail. OT security team can monitor sessions in real-time and terminate immediately if anomalous behavior is detected. Session logs stored for compliance review.

4
Auto-Expiry & Revocation

Access automatically expires after the approved maintenance window. No persistent credentials. No standing VPN tunnels. Each session requires fresh authentication. Vendor cellular routers on machines are prohibited — all access through the centralized gateway.

Need secure vendor remote access designed into your greenfield factory? Secure Your Factory Network — we design jump server architecture, MFA integration, and session monitoring as part of the IT/OT separation blueprint.

OT Network Monitoring & Intrusion Detection

Passive OT Network Monitoring

Non-intrusive monitoring via SPAN/mirror ports on OT switches. Captures all traffic without injecting packets or affecting control system performance. Builds asset inventory automatically — discovers every device, protocol, and communication path on the OT network.

Anomaly Detection (AI-Powered)

ML models learn normal OT traffic patterns: which PLCs talk to which HMIs, at what frequency, using which commands. Any deviation — new device, unusual protocol, unexpected command — triggers an alert. Detects both cyber threats and misconfigured equipment.

Deep Packet Inspection (OT Protocols)

Understands industrial protocols (EtherNet/IP CIP, Modbus TCP, PROFINET, OPC UA, S7comm) at the application layer. Detects malicious commands that standard IT firewalls miss — for example, a PLC firmware download that wasn't authorized or a safety PLC mode change.

SIEM Integration & Incident Response

OT security events fed into plant SIEM or SOC alongside IT events for unified threat visibility. Automated playbooks for OT-specific incidents: isolate compromised zone, preserve forensic evidence, notify operations and engineering simultaneously.

Key Benefits & ROI

ZeroIT-to-OT ransomware movement — physical + logical separation
<1msDeterministic OT latency — no business traffic competing
IEC 62443Compliant from day one — zones, conduits, security levels
100%Auditable remote access — MFA, session recording, auto-expiry
24/7OT threat detection — passive monitoring + AI anomaly detection

Separation Is Cheaper Than Recovery

iFactory designs physically and logically separated IT/OT networks for greenfield factories — Purdue Model architecture, IEC 62443 zones and conduits, industrial firewalls, DMZ design, secure remote access, and OT monitoring — all as construction-ready documentation.

Frequently Asked Questions

What is the Purdue Model and why does it matter for OT security?
The Purdue Enterprise Reference Architecture (PERA) organizes factory systems into 6 hierarchical levels: Level 0 (physical process) through Level 5 (enterprise). The key principle: enterprise IT systems (Level 4-5) must never directly access control systems (Level 0-2). A DMZ at Level 3.5 acts as a buffer — data flows through it, but no direct IT-to-OT connections exist. It's the foundation of industrial network security and is referenced by NIST 800-82, IEC 62443, and virtually every OT cybersecurity standard. In greenfield, we implement Purdue architecture physically — separate cable plants, separate switches, separate server racks — not just logically with VLANs (which can be misconfigured).
Should IT and OT networks be physically separated or just logically (VLANs)?
Both — defense in depth. Physical separation (separate cable plants, separate switches, separate fiber paths) is the strongest protection and should be the baseline for greenfield design because the incremental cost during construction is minimal. Logical separation (VLANs, ACLs, firewall rules) adds granularity within each physical domain — micro-segmenting OT zones by production cell, isolating safety systems, and controlling traffic between L2 and L3. VLANs alone are insufficient because a single misconfigured switch port or trunk link can bridge the separation. Physical separation ensures that even configuration errors can't create IT-to-OT paths. In greenfield, both are designed in — separate conduit for IT and OT cable, plus VLAN segmentation within each domain.
How should vendors remotely access OT systems?
Never directly. All vendor remote access must route through a hardened jump server in the DMZ with MFA, session recording, and time-limited access. The vendor connects via encrypted VPN to the DMZ gateway, authenticates with multi-factor credentials, and accesses a jump server that provides controlled access to specific approved OT targets only. No file transfer, clipboard sharing, or USB passthrough unless explicitly approved per session. Sessions auto-expire after the approved window. Vendor-installed cellular routers on machines (a common shortcut) are prohibited — they create unmonitored backdoors that bypass all security controls. In greenfield, the remote access architecture is designed and documented before equipment vendors are contracted.
What industrial firewalls should we use?
Industrial firewalls at the IT/OT boundary must understand OT protocols (EtherNet/IP, Modbus TCP, PROFINET, OPC UA, S7comm) at the application layer — not just IP/port filtering. Leading options include Fortinet FortiGate with OT security module, Palo Alto Networks with IoT/OT visibility, and Cisco ISA (Industrial Security Appliance). For the highest-security deployments, add a data diode (hardware-enforced one-way data flow) from OT to IT — physically guarantees no inbound traffic can reach the control network. In greenfield, we specify dual-firewall DMZ architecture: one firewall facing IT (standard next-gen), one facing OT (OT-protocol-aware), with the DMZ zone between them.
How does IEC 62443 differ from the Purdue Model?
Purdue describes where systems live (hierarchical levels). IEC 62443 defines how they must be protected (zones, conduits, and security levels). Purdue is a conceptual reference model — it doesn't prescribe specific security measures. IEC 62443 is a comprehensive cybersecurity standard with specific requirements: risk assessments (62443-3-2), security levels (SL-1 through SL-4), zone/conduit design, and lifecycle management. The two are complementary: use Purdue to structure the network architecture, then apply IEC 62443 zones and conduits to define security policies within and between Purdue levels. In greenfield, we design for both: Purdue-aligned physical architecture + IEC 62443 zone/conduit security policies documented for compliance. Book a demo to see the combined architecture.

$4.4M Average Ransomware Cost vs. $50K for Greenfield Network Separation

The math is simple. Design IT/OT separation into the building — separate cables, firewalls, DMZ, and monitoring — and eliminate the attack surface before the first machine connects.


Share This Story, Choose Your Platform!