How to Segment Control and Safety Systems

Network Architecture and Design
Network Architecture and Design

How to Segment Control and Safety Systems

How to Segment Control and Safety Systems

Learn essential principles, architectures, and best practices for segmenting control and safety systems to enhance security and operational reliability in industrial environments.

📖 Estimated Reading Time: 6 minutes

Article

Segmenting Control and Safety Systems: Principles, Architectures, and Practical Approaches

Introduction

Effective segmentation of control and safety systems is foundational to industrial security and operational reliability. For CISOs, IT Directors, Network Engineers, and Operators tasked with safeguarding critical infrastructures, an in-depth understanding of segmentation, its technical implications, and deployment intricacies is essential. This post offers a comprehensive review of segmentation practices, with precise technical analysis, historical context, and actionable guidance for real-world deployment in environments spanning from traditional manufacturing to digital power grids and advanced process automation.


Historical Context: From Flat Networks to Segmented Architectures

Industrial networks have evolved significantly since the widespread adoption of distributed control systems (DCS) in the 1970s and 1980s. Initially, process control networks were largely flat, leveraging proprietary or unstandardized protocols with minimal access controls. Safety instrumented systems (SIS), designed to operate autonomously, were often isolated at the physical layer to ensure operational independence.


However, increasing demands for integration, driven by enterprise connectivity (e.g., ERP, MES integration), necessitated an architectural shift. Recognizing the risk of lateral movement and accidental failures propagating across systems, the Purdue Enterprise Reference Architecture (PERA) was formalized in the 1990s, and later codified in the ISA-95 and ISA/IEC-62443 standards. These models advocate for network segmentation and zoning, with a clear separation not only between IT and OT environments but also within OT—especially between control and safety domains.

Technical Concepts: Segmentation, Isolation, and Enclaves

Network Segmentation Defined

Network segmentation refers to dividing a network into smaller, logically-distinct segments or zones, each governed by specific security and operational policies. The central objectives are limiting the blast radius of failures or breaches, ensuring least privilege access, and reducing complexity in monitoring and response.

Levels of Segmentation

  • Physical segmentation: Distinct cabling, hardware pathways, and air-gapped systems; offers high assurance but often increased cost and operational inflexibility.

  • Logical segmentation: VLANs, VRFs, subnetting, and VPN tunnels; allows for segregation on shared infrastructure, balancing cost and complexity.

  • Application-level segmentation: Micro-segmentation using identity-aware proxies, whitelisting, and application firewalls.

Control vs. Safety System Characteristics

  • Control Systems (DCS, PLC): Responsible for continuous process operation, closed-loop regulation, and coordination of industrial assets. Tolerate some latency and may feature comprehensive HMI/SCADA integration.

  • Safety Instrumented Systems (SIS): Typically independent controllers with deterministic response guarantees, tasked with placing processes into a safe state upon abnormal conditions. Design is often based on fail-safe, certified (e.g., SIL-rated per IEC 61508), and minimal operational dependencies.

ISA/IEC-62443 Zoning: The Foundation for Segmentation

The ISA/IEC-62443 framework provides the most widely-accepted zoning model for industrial systems. It mandates:

  • Segregation of networks into zones (functionally or risk-justified groupings such as control zones, safety zones, demilitarized zones).

  • Conduits: The defined, controlled communication paths between zones. Security mechanisms (firewalls, application proxies) are enforced at these junctions.

  • Each zone has explicitly defined security levels reflecting threat models and asset criticality.

Segmentation Architectures: Options and Best Practices

Physical Isolation (Hard Zoning)

The traditional standard for SIS segmentation is physical separation: separate switches, network cabling, and no shared routable infrastructure between control (BPCS/DCS/PLC) and safety (SIS) systems. This approach addresses common-cause failures and "shared fate" risks—including firmware vulnerabilities, broadcast storms, or rogue device induction.

Limitations: Higher cost, operational rigidity, and challenges in remote diagnostics or data collection.

Logical Segmentation with Hardened Inter-Zone Devices

Modern deployments increasingly leverage logical segmentation:


  • VLANs and subnets: Isolate traffic at Layer 2/3; use routable boundaries to enforce ACLs and traffic policing.

  • Industrial Firewalls: Layer 4–7 filtering, protocol whitelisting (e.g., allow only OPC UA, Modbus, CIP as required); deep packet inspection (DPI) for protocol-conformant traffic.

  • Data Diodes / Unidirectional Gateways: For outbound data transfer from SIS to historians/HMI, prevent command/control injection back into SIS networks.

Vendors may support dual-port network interfaces on SIS controllers to allow diagnostics or data export without exposing the core SIS logic engine to routable infrastructure. For example, SIS may have one interface for engineering workstation interaction (physically connected only during maintenance) and a separate, highly-policed link for monitoring.

Service-Oriented Segmentation (Zero Trust Principles)

Advanced architectures are embracing Zero Trust (ZT) tenets (never trust, always verify), especially where access must be granted for remote support or IIoT integration:

  • Strong identity-based gating, mutual authentication, and encrypted tunnels between zones.

  • Least privilege: Time-bound, just-in-time access via PAM/enclave solutions for engineering tool access into control/safety enclaves.

  • Continuous monitoring—network and endpoint detection/response—to catch policy deviations.

Practical Deployment Considerations

Legacy Constraints

Many plants must segment brownfield installations where legacy controllers may not support modern protocols or security features. In these environments:


  • Physical firewalls and protocol gateways may be required.

  • Avoid multi-homed devices bridging control and safety zones.

  • Where feasible, replace or retrofit network cards with managed, scannable alternatives supporting modern access controls (e.g., port security, 802.1X).

Policy and Process

Effective segmentation must be paired with:


  • Formal change management, ensuring any modification (e.g., temporary cross-zone access during commissioning) is risk-assessed and logged.

  • Ongoing validation (e.g., periodic network mapping and penetration testing) to confirm that segmentation boundaries are respected and have not been eroded by “creep.”

  • Comprehensive asset inventory, identifying all endpoints and their associated zones/conduits.

IT/OT Collaboration

Segmentation is not solely a technical control, but an exercise in converging operational requirements (availability, determinism) and information security priorities (confidentiality, integrity, nonrepudiation). Practical steps:


  • Jointly define requirements (OT: process safety/availability; IT: cyber-resilience, auditability).

  • Design zones/conduits to serve minimal business need — avoid default routability between IT, control, and safety environments.

  • Develop shared incident response playbooks that account for segmented architecture (e.g., communication paths for alerts during a zone compromise).

Emerging Trends and Future Directions

The convergence of IT/OT—particularly with the adoption of Ethernet-based fieldbus, converged control-safety platforms, and IIoT—demands continuous adaptation of segmentation practices. Emerging standards (e.g., IEC 62443-3-3) and reference architectures from industry working groups (e.g., CISA ICS Reference Architecture) provide additional specificity for modern deployments.

The application of micro-segmentation at the workload/container level (e.g., via SDN, service meshes), and closed-loop monitoring with behavioral analytics, are rapidly maturing. Yet, the core principle remains: safety and control must remain uncompromisingly segmented, with policy-justified, tightly-managed conduits for any cross-domain interactions.

Conclusion

Network segmentation for control and safety systems is neither a checkbox nor a static exercise. It requires deep technical expertise, contextualized to both the architectural history and operational exigencies of each facility. As threat actors evolve and digital transformation accelerates, professionals must pair solid foundational segmentation with rigorous governance and cross-functional collaboration, ensuring resilient, safe, and productive industrial operations.


Background

Get in Touch with Trout team

Enter your information and our team will be in touch shortly.

Background

Get in Touch with Trout team

Enter your information and our team will be in touch shortly.