🪷 Every tool on this site is free. No email. No credit card. No sales call. Ever.
← Back to Blog
Security 8 min read May 14, 2026

OT/IT Network Security for Manufacturers: The Plain-English Guide

Applying standard IT security to a factory floor will either leave your shop floor exposed or accidentally take down a production line. Here's how OT security actually works — and what your IT provider needs to understand.

Most IT providers are good at securing offices. Manufacturers don't have offices — they have production floors, where the computers run machines that can cause physical damage, worker injuries, or multi-million-dollar production shutdowns if configured incorrectly.

This guide explains OT/IT security in terms that both IT professionals and plant managers can use together. Because in manufacturing, if IT and operations aren't aligned on security, neither function can do its job safely.

Why You Can't Apply Standard IT Security to the Shop Floor

Standard IT security is built on three principles, usually prioritized in this order:

  1. Confidentiality: Only authorized people see the data
  2. Integrity: Data is accurate and hasn't been tampered with
  3. Availability: Systems are up when people need them

OT security flips this entirely:

  1. Safety: Physical processes must not harm people or equipment
  2. Availability: Production must continue
  3. Integrity: Control logic must be accurate
  4. Confidentiality: Least priority for most OT systems

A standard IT patch management approach says: apply security patches within 30 days, reboot as needed. Applied to a PLC controlling a hydraulic press, this could cause an unexpected mid-cycle shutdown that damages the tooling, the workpiece, or — in a worst case — the operator. This is why the IT team cannot own OT security decisions unilaterally. And it's why OT can't be left completely unmanaged from a security perspective either.

The Purdue Model: Your Network Architecture Blueprint

The Purdue Reference Model (also called ISA/IEC 62443 architecture in its modern form) is the standard framework for structuring OT/IT networks. Think of it as a layered model where each layer only communicates with the layers directly adjacent to it — never jumping layers.

Level 4–5: Enterprise Network (IT)

Your standard business network. Email, ERP (Sage, SAP, Epicor), Microsoft 365, file servers, HR systems. Standard IT security practices apply here: patch regularly, enforce MFA, use EDR, log everything.

Industrial DMZ (The Critical Boundary)

A demilitarized zone between your IT network and your OT network. This is where data is transferred between the two worlds in a controlled, monitored way. Components typically include:

  • Industrial firewalls (Fortinet FortiGate, Palo Alto, Cisco IE series)
  • Historian servers that collect OT data and make it available to IT without allowing direct IT-to-OT connections
  • Data diodes (hardware that allows data to flow only one direction — from OT to IT) for the most security-sensitive environments
  • Jump servers for authorized engineering access to OT systems

The DMZ design principle: no direct connections from IT to OT or from OT to IT. All data exchange happens through controlled intermediaries.

Level 3: Manufacturing Operations (MES)

Manufacturing Execution Systems, production scheduling, batch management, quality management. This layer bridges IT and OT — it receives production orders from the ERP above and sends execution data down to control systems below. MES systems require careful access control: engineering and operations can configure production parameters; shop floor workers interact with it but shouldn't be able to modify configuration.

Level 2: Supervisory Control (SCADA/HMI)

SCADA systems, HMI workstations, historian servers at the OT level. These are the "eyes" of the production floor — operators see process status and can intervene. Patching is complex here because vendor-supplied SCADA software may have OS dependencies that can't be changed without revalidation. Security relies more on network isolation and application whitelisting than on patching.

Level 1: Control Systems (PLCs, DCS)

The devices that actually control physical processes. PLCs, DCS controllers, motion controllers. These run proprietary firmware and often run for years without change. Security comes entirely from network isolation — they should have no direct network exposure to IT or the internet.

Level 0: Physical Process

Sensors, actuators, drives, robots, CNCs. Physical layer — IT has no role here, but OT network connectivity affects these devices' behavior.

The Engineering Workstation: Your Biggest Risk

Engineering workstations are where attacks pivot from IT to OT. They're used to program PLCs, configure SCADA, update HMI logic — and they also run Windows, receive email, and connect to engineering vendor portals.

A phishing email that installs malware on an engineering workstation gives an attacker a foothold in both the IT world and the OT world simultaneously. From there, they can:

  • Observe production processes and identify sabotage opportunities
  • Modify PLC logic to cause equipment malfunction
  • Exfiltrate proprietary production recipes, tooling parameters, and process data
  • Install ransomware payloads that execute simultaneously on IT and OT systems

Hardening Engineering Workstations

  • Application whitelisting: Only approved applications can run — no ad-hoc software installation. Windows AppLocker or a commercial tool like Carbon Black enforces this.
  • USB port restriction: USB drives are a common OT attack vector (the original Stuxnet used USB). Engineering workstations should require IT authorization for any USB device.
  • No general internet browsing: Engineering workstations should not be used for general web browsing or personal email. Separate a "browsing" machine for internet access if needed.
  • Separate authentication: Engineering workstation credentials should be separate from standard domain credentials. If the IT domain is compromised, attackers shouldn't automatically have access to engineering workstations.
  • Network segmentation: Engineering workstations should be on a dedicated VLAN with firewall rules that restrict their connections to only required OT systems and vendor support portals.

Remote Access to OT Systems

OT vendors (Rockwell, Siemens, Beckhoff, Mitsubishi) often require remote access for support. This is a significant risk surface. Best practices:

  • No persistent VPN connections: Remote vendor access should be activated on-demand, monitored in real time, and terminated when the session ends
  • Jump server architecture: Vendors connect to a jump server in the DMZ, not directly to OT devices
  • Session recording: All vendor remote sessions recorded and retained
  • MFA for vendor access: Even if the vendor complains, MFA on remote access is non-negotiable

What to Ask Your IT Provider

These questions separate providers who understand OT from those who will figure it out at your expense:

  • "Can you describe our OT network architecture and what your recommendations would be for segmentation?"
  • "How do you handle patching for OT systems running on legacy operating systems?"
  • "What industrial firewalls have you deployed? Have you configured an industrial DMZ before?"
  • "How would you handle a ransomware incident that started in the IT network — what's your protocol to prevent it reaching OT?"
  • "Have you worked with a machine builder or OT vendor on network integration? Who do you call when an IT change affects OT?"

If they can't answer these specifically, they haven't done OT security. Manufacturing requires an IT provider who has — find out more about what manufacturing IT support looks like and what qualifications to look for in a provider who's actually worked on shop floors.

Related Free Tools

IT Compliance Checklist
HIPAA, PCI, SOC 2 in plain English
🛡️
Cyber Risk Assessment
Full risk map in plain English
📋
RFP Generator
Build a vendor RFP in minutes
🔍
IT Sanity Check
Is your IT actually protecting you?

Your shop floor needs different IT than your office.

Get matched with an IT provider who's actually worked with manufacturers.

Get Matched With a Manufacturing MSP →