TroutTrout
Back to Blog
Flat networksSegmented networksIndustrial security

Flat Network vs Segmented Network in Industrial Environments

Trout Team7 min read

Flat network vs segmented network is the architecture decision every industrial network architect makes, explicitly or by default. A flat network puts every PLC, HMI, workstation, and switch on the same broadcast domain: simple to manage, but a compromised laptop has direct Layer 2 access to your safety controllers. A segmented network divides those devices into zones with policy enforcement at every boundary: more design work, but a breach in one zone stays in one zone.

This guide compares the two architectures across security, compliance, and operational cost, then shows the migration path from flat to segmented without production downtime.

Network segmentation diagram comparing flat vs segmented network architectures, lateral movement risk and zone isolation in industrial environments

Flat Network vs Segmented Network: Side-by-Side Comparison

DimensionFlat NetworkSegmented Network
Layer 2 broadcast domainSingle, sharedOne per segment
Lateral movement after breachUnrestricted across all devicesBlocked at zone boundaries
Enforcement point for access controlNoneRouter, firewall, or access gate at each boundary
Audit trail for cross-zone trafficNone, traffic does not cross a boundaryEvery cross-zone connection logged
Compliance (CMMC L2, NIS2, IEC 62443)Non-compliantRequired architecture
Operational complexityLow, one subnetHigher: subnet design, VLAN tagging, ACLs
Hardware neededOne switchLayer 3 switches or routers at segment boundaries
Recommended forLabs, ≤20-device deployments, commissioningProduction OT, regulated industries, multi-zone facilities

Flat Networks

A flat network puts all devices in a single Layer 2 broadcast domain. Every device can reach every other device directly.

Where Flat Networks Work

  • Small installations with fewer than 20 devices where complexity is not justified
  • Lab or test environments where security is not a production concern
  • Temporary setups during commissioning or migration

Where They Fail

Lateral movement. Once an attacker compromises any device on a flat network, they can reach every other device. A phishing email that compromises an office workstation gives the attacker direct access to PLCs, HMIs, and safety controllers on the same subnet.

Technical detail: On a flat Layer 2 network, ARP broadcasts reach every device. An attacker can ARP-spoof the default gateway, intercept all traffic, and pivot to any device without crossing a routing boundary. There is no enforcement point to block this.

Broadcast storms. All devices share the same broadcast domain. A misconfigured device or a network loop can generate broadcast traffic that saturates the network. In IT, this causes slow email. In OT, this causes missed PLC scan cycles and control instability.

No compliance path. CMMC, NIS2, and NIST 800-171 all require network segmentation. A flat network cannot satisfy these requirements regardless of what other controls are in place.

Segmented Networks

A segmented network divides devices into separate subnets or VLANs, each with its own broadcast domain. Traffic between segments passes through a router, firewall, or access gate that enforces policy.

Network Segmentation Benefits

Breach containment. A compromised device in one segment cannot reach devices in another segment without crossing an enforcement point. If the enforcement point blocks the traffic, the breach stays contained.

Per-zone access control. Each segment boundary is an opportunity to enforce who can access what. An operator on the production VLAN can reach the PLCs they manage. They cannot reach the safety system VLAN or the enterprise servers.

Audit trail. Every cross-segment connection passes through a logging point. You know who crossed which boundary, when, and using what protocol.

The Cost

Complexity. Segmented networks require more planning: subnet design, VLAN configuration, routing rules, firewall policies. Misconfiguration can block legitimate traffic and cause production issues.

Hardware. Segmentation needs routers or Layer 3 switches at segment boundaries. Depending on the architecture, this may require additional firewalls or access control appliances.

Operational overhead. Adding a new device means assigning it to the right segment. Moving a device means updating VLAN membership and firewall rules. This requires documentation and change management.

Technical detail: The most common segmentation mistake is creating VLANs without enforcing routing policy between them. If inter-VLAN routing is enabled on a Layer 3 switch without ACLs, the VLANs provide broadcast isolation but zero security benefit. Traffic still flows freely between segments. Segmentation without enforcement is cosmetic.

Industrial Network Segmentation: What Makes It Different

Industrial network segmentation is not the same problem as office IT segmentation. Three constraints change the design:

  1. Deterministic timing. PLC scan cycles and safety loops have sub-millisecond budgets. Enforcement that adds 5ms of latency at every hop can destabilize control. Segment boundaries must be placed between functional zones, not between every device.
  2. Protocol awareness. Modbus, EtherNet/IP, OPC UA, and PROFINET use protocol behaviors a generic IP firewall does not understand. Segmentation rules written at the TCP-port level either over-block (production stops) or under-block (no security gain). ICS network segmentation needs protocol-aware enforcement at the conduit.
  3. No agent option. Most PLCs, HMIs, and legacy controllers cannot run an endpoint agent. Segmentation must be enforced from the network, not the endpoint.

Standards that mandate OT network segmentation: IEC 62443 (zone and conduit model with defined Security Levels), NIST 800-82 Rev 3 (OT cybersecurity guide), CMMC AC.L2-3.1.3 (information-flow control), and NIS2 Article 21 (risk-based segmentation for essential and important entities).

Trade-offs for Industrial Environments

Compliance Requirements

CMMC Level 2 and NIS2 both mandate network segmentation for environments handling controlled information or critical services. Defense contractors, energy operators, and manufacturers in regulated sectors do not have a choice: segmentation is required.

FrameworkSegmentation Requirement
CMMC Level 2AC.L2-3.1.3: Control information flow between security domains
NIS2Article 21: Risk-based measures including network segmentation
NIST 800-171SC-7: Boundary protection with controlled interfaces
IEC 62443Zone and conduit model with defined security levels

Operational Impact

Segmentation adds latency at each boundary (typically under 1ms for a firewall or access gate). For most OT applications, this is negligible. For hard real-time control loops with sub-millisecond requirements, place all devices in the same segment and enforce security at the segment boundary rather than between individual devices.

How to Implement Network Segmentation in OT

Network segmentation best practices for OT environments follow a phased pattern: map first, enforce last. The five steps below move you from flat to segmented without a forklift replacement and without taking production down.

  1. Map your network. Document every device, its IP, its function, and what it communicates with. Passive discovery (mirroring traffic to a listener) avoids active scans that can crash older PLCs.
  2. Define zones. Group devices by function and security requirement. Production PLCs in one zone, HMIs in another, enterprise IT in a third. IEC 62443 zone and conduit terminology gives you a vocabulary auditors recognize.
  3. Deploy enforcement. Place a firewall, access gate, or Layer 3 switch with ACLs at each zone boundary. For environments where switches cannot be touched, overlay segmentation runs adjacent to the existing network instead of replacing it.
  4. Start permissive, then tighten. Begin with logging-only mode to capture actual traffic patterns. Use the logs to build allowlists. Then switch to enforcement mode.
  5. Monitor continuously. Baseline normal cross-zone traffic and alert on deviations. Cross-zone connection logs are also the audit trail CMMC, NIS2, and IEC 62443 require.

Conclusion

Flat networks trade security for simplicity. That trade-off is acceptable in a lab. It is not acceptable in a production OT environment where a compromised device can reach safety controllers, where compliance mandates segmentation, and where broadcast storms can halt production.

Segment your network. Enforce policy at every boundary. Start with the highest-risk zones and expand from there.

FAQ

Frequently Asked Questions

What is the difference between a flat network and a segmented network?
A flat network puts every device in a single Layer 2 broadcast domain: any device can reach any other directly, with no enforcement point in between. A segmented network divides devices into separate subnets or VLANs with policy enforcement at the boundaries, so traffic between zones is logged, filtered, or blocked.
Why is a flat network a security risk?
On a flat network, a compromised device has unrestricted access to every other device on the same broadcast domain. An attacker who phishes a single office workstation can reach PLCs, HMIs, and safety controllers without crossing any enforcement point. ARP-spoofing the gateway gives them visibility into all traffic.
Is network segmentation required for CMMC and NIS2?
Yes. CMMC AC.L2-3.1.3 requires control of information flow between security domains, NIS2 Article 21 mandates risk-based segmentation for essential and important entities, NIST 800-171 SC-7 requires boundary protection with controlled interfaces, and IEC 62443 defines the zone-and-conduit model. A flat network cannot satisfy any of these.
Can you segment a network without replacing equipment?
Yes. Overlay segmentation enforces policy at a network-resident gateway placed adjacent to existing switches, rather than replacing the switches themselves. This is the standard approach for OT environments where the switches and PLCs cannot be touched.
What is the difference between VLAN segmentation and network segmentation?
VLAN segmentation isolates broadcast domains at Layer 2. Network segmentation adds Layer 3 policy enforcement (ACLs, firewall rules, or a proxy) at every VLAN boundary. VLANs without enforcement provide broadcast isolation but zero security benefit: inter-VLAN routing still moves traffic freely between zones.