Skip to main content
Powerfabric
SCADA

IEC 62443 Zones and Conduits for Industrial Cybersecurity

IEC 62443 Zones and Conduits for Industrial Cybersecurity

Industrial cybersecurity is no longer a “best effort” activity layered on top of automation design. For SCADA, PLC, DCS, and remote I/O architectures, security must be engineered into the control system topology from the start. IEC 62443 addresses this by introducing two core concepts: zones, which group assets with similar security requirements, and conduits, which are the controlled communication paths between zones. For EPCs, panel builders, and owners operating in Europe, this model is especially useful because it supports risk-based design, documentation, and lifecycle management aligned with CE-related technical files, the EU Machinery framework, and NIS2-driven operational resilience expectations.

What IEC 62443 Means by Zones and Conduits

IEC 62443-3-2 defines the risk assessment and system security requirements process for industrial automation and control systems (IACS), while IEC 62443-3-3 defines the system security requirements and security levels. In that framework:

  • Zone: a grouping of logical or physical assets that share common security requirements, trust assumptions, and risk profile.
  • Conduit: a communication path between zones that is explicitly controlled, monitored, and secured according to the required security level.

The practical value is that you do not secure every device identically. Instead, you segment the architecture so that a compromise in one area does not automatically propagate to the rest of the plant. This is the industrial equivalent of fire compartmentation in building design: the objective is containment, not absolute prevention of all events.

IEC 62443-3-2 requires a risk assessment that identifies zones and conduits and assigns target security levels (SL-T). IEC 62443-3-3 then translates those targets into foundational requirements such as identification and authentication control, use control, system integrity, data confidentiality, restricted data flow, timely response to events, and resource availability.

Why Zones and Conduits Matter in SCADA Architectures

Typical SCADA environments include engineering workstations, operator HMIs, historians, domain services, remote terminal units, PLCs, safety systems, and vendor remote access. These assets rarely have the same exposure or the same consequences if compromised. A historian may need enterprise connectivity; a safety PLC should not. A remote maintenance tunnel may be necessary; it must not become a permanent backdoor.

Zones and conduits help control three major engineering risks:

  • Propagation risk: malware or unauthorized commands moving from IT to OT or from one production line to another.
  • Trust collapse: excessive flat networks where every node can reach every other node.
  • Operational coupling: a failure in one service, such as DNS or Active Directory, unintentionally affecting control availability.

For European projects, this also supports demonstrable due diligence. While IEC 62443 is not itself a law, it is increasingly used as the technical basis for contract specifications, supplier qualification, and security evidence under NIS2-aligned governance. It also complements EN 62443 adoption in procurement and acceptance testing.

How to Define Zones

A zone should be formed around a shared risk profile, not just around physical location. IEC 62443-3-2 promotes a risk-based approach: group assets that have similar security requirements and can tolerate the same security controls. In practice, common zone boundaries include:

  • Enterprise IT zone
  • DMZ or industrial DMZ
  • Operations zone
  • Cell/area zones for production lines or process units
  • Safety instrumented system zone
  • Vendor support zone
  • Remote access zone

When defining zones, consider the following engineering questions:

  1. Which assets share the same availability, integrity, and confidentiality requirements?
  2. Which assets must never be directly reachable from untrusted networks?
  3. Which assets have common patching, backup, and authentication policies?
  4. What is the consequence of compromise: loss of production, safety impact, environmental impact, or data loss?

IEC 62443-3-3 SR 5.1 and SR 5.2 are particularly relevant when designing zones, because restricted data flow and controlled communication are the primary mechanisms by which zone boundaries are enforced.

How to Define Conduits

A conduit is not merely a cable, VLAN, or firewall rule. It is the complete communication relationship between zones, including all technical and procedural controls that govern that communication. A conduit may include firewalls, data diodes, jump servers, VPNs, protocol gateways, authentication controls, logging, and monitoring.

IEC 62443-3-3 SR 5.1 requires segmentation and boundary protection to restrict data flow. SR 1.1 through SR 1.3 address identification, authentication, and account management; SR 2.1 and SR 2.2 address authorization and least privilege; SR 6.1 and SR 6.2 support timely detection and response. A conduit should be designed so that only explicitly required traffic is allowed, with strong logging and operational ownership.

In SCADA, common conduit patterns include:

  • Firewall-controlled conduit: bidirectional traffic with strict allowlists.
  • DMZ-mediated conduit: enterprise services terminate in a DMZ, not directly in the control zone.
  • Unidirectional conduit: data export from OT to IT using a data diode or equivalent.
  • Brokered remote access conduit: vendor access through a jump host with MFA and session recording.

Worked Example: Segmentation of a Water Treatment SCADA System

Consider a municipal water treatment plant with the following assets:

  • 1 enterprise historian interface
  • 2 SCADA servers
  • 6 operator HMIs
  • 12 PLCs across 4 process areas
  • 1 engineering workstation
  • 1 remote access service for OEM support

The plant wants to reduce lateral movement risk and align with IEC 62443-3-2. A reasonable zone model could be:

  • Zone A: Enterprise IT
  • Zone B: Industrial DMZ
  • Zone C: Control Center Operations
  • Zone D: Process Area 1
  • Zone E: Process Area 2
  • Zone F: Process Area 3
  • Zone G: Process Area 4
  • Zone H: Vendor Remote Support

Assume the engineering team estimates that each PLC subnet should only communicate with the SCADA servers and the engineering workstation, not with other process areas. If each process area has 3 PLCs, then each area contains 3 PLC nodes plus associated I/O and switch infrastructure. The number of inter-zone communication paths is reduced dramatically by segmentation.

If the system were flat, each of the 12 PLCs could potentially communicate with the other 11 PLCs, producing:

$$\text{Potential peer-to-peer paths} = \frac{12 \times 11}{2} = 66$$

With four process zones and a control center zone, the required conduits may be reduced to:

  • 4 conduits from Control Center to each Process Area zone
  • 1 conduit from Control Center to DMZ
  • 1 conduit from DMZ to Enterprise IT
  • 1 conduit from DMZ to Vendor Support

That is 7 primary conduits instead of a highly interconnected flat mesh. The security benefit is not only fewer paths, but also simpler rule sets, clearer ownership, and better auditability.

Now consider availability impact. Suppose a firewall in each conduit has a measured annual failure probability of 0.5% and the plant uses one firewall pair per conduit with failover. If the pair failure probability is approximated as:

$$P_{pair} \approx (0.005)^2 = 0.000025 = 0.0025\%$$

Then the probability of failure per conduit is very low, but the design must still account for maintenance bypass, rule drift, and configuration errors. This is why IEC 62443 emphasizes lifecycle processes, not only hardware selection. Security is a systems engineering discipline, not a product feature.

For the remote support path, a secure conduit design would require:

  • MFA for all external users
  • Time-bound access approval
  • Jump host in the DMZ
  • No direct inbound access to PLCs
  • Session logging and recording
  • Vendor account review and revocation process

This would typically satisfy the intent of IEC 62443-3-3 SR 1, SR 2, SR 5, and SR 6, assuming the technical implementation is validated and operational procedures are enforced.

Decision Matrix: Choosing a Zone and Conduit Strategy

Pattern Best Use Case Strengths Limitations Relevant IEC 62443 Focus
Flat network Small temporary test setups Simple, low cost Poor containment, high lateral movement risk Generally noncompliant with SR 5 intent for production systems
Zone with firewall conduit Most SCADA plants Good balance of control and complexity Requires disciplined rule management IEC 62443-3-3 SR 5.1, SR 5.2
DMZ-mediated architecture IT/OT integration, historian replication, remote access Strong separation between enterprise and control zones More infrastructure and administration IEC 62443-3-2 risk-based zoning, SR 5
Unidirectional conduit Safety-critical or high-assurance data export Prevents inbound compromise from IT Limited bidirectional services Strong restricted data flow implementation
Brokered remote access OEM support and maintenance Controlled vendor access, good auditability Operational overhead IEC 62443-3-3 SR 1, SR 2, SR 6

Engineering and Documentation Requirements

IEC 62443-3-2 expects the integrator or asset owner to document the risk assessment, zone definitions, conduit definitions, target security levels, and assumptions. This documentation should be consistent with the plant’s network diagrams, cause-and-effect matrices, asset inventory, and access-control procedures. For European projects, the technical file should also support conformity evidence under the Machinery Regulation transition path and any applicable contractual cybersecurity requirements.

Good documentation should include:

  • Asset list by zone
  • Data flow diagram showing every conduit
  • Allowed protocols and ports per conduit
  • Authentication requirements for each access path
  • Logging and monitoring points
  • Backup, restore, and recovery dependencies
  • Patch and vulnerability management responsibilities

For electrical contractors and panel builders, this means cybersecurity controls should appear in the same design package as enclosure layouts, terminal schedules, network cabinets, and FAT/SAT procedures. Security controls that are not testable at FAT are often not real in the field.

Common Clause-Level References

Key references commonly used in engineering specifications include:

  • IEC 62443-3-2: security risk assessment and system design requirements, including zone and conduit identification.
  • IEC 62443-3-3: system security requirements and security levels, especially SR 5.1, SR 5.2, SR 1.1, SR 2.1, and SR 6.1.
  • IEC 62443-2-1: security program requirements for asset owners.
  • IEC 62443-2-4: security program requirements for service providers and integrators.
  • ISA/IEC 62443: the ISA adoption of the same family, widely used in North America and multinational projects.

Where electrical safety and functional safety intersect with cybersecurity, IEC 61511 and IEC 61508 remain relevant for the safety lifecycle, but they do not replace cybersecurity zoning. Likewise, NFPA 70 and NFPA 79 address electrical installation and industrial machinery wiring practices, but they do not provide the same cyber segmentation model. The standards are complementary, not interchangeable.

Closing Guidance: Common Mistakes and How to Avoid Them

The most common engineering mistake is treating zones and conduits as a drawing exercise instead of an operational control model. Another frequent error is building a DMZ but then allowing unrestricted “temporary” rules that become permanent. Teams also overtrust VLANs without firewall policy, authentication, and monitoring, or they place vendor remote access directly into the control zone. Finally, many projects fail because the zone model is never reconciled with backup, patching, and incident response procedures.

To avoid these problems, define zones from the risk assessment, not from convenience; make every conduit explicit and testable; assign ownership for rule changes; validate remote access under real operational scenarios; and review the architecture after every major plant modification. In IEC 62443 terms, good cybersecurity is not a one-time network design—it is a managed lifecycle of segmentation, control, verification, and continuous improvement.

Frequently asked questions

What is the IEC 62443 definition of a zone in industrial cybersecurity, and how should it be applied in a SCADA architecture?

In IEC 62443, a zone is a logical or physical grouping of assets that share common security requirements based on risk and function, such as a PLC cell, a SCADA server cluster, or a remote operations network. In practice, SCADA engineers should define zones around trust boundaries and operational roles, then assign a target security level to each zone under IEC 62443-3-2 and IEC 62443-3-3.

What is a conduit in IEC 62443, and how is it different from a network segment or VLAN?

A conduit is the controlled communication path between zones, including the technical and procedural protections applied to that path, such as firewalls, jump servers, VPNs, and protocol whitelisting. Unlike a simple VLAN or switch segment, a conduit is defined by security function and risk treatment, consistent with IEC 62443-3-2 and IEC 62443-3-3.

How do you determine zone boundaries for PLCs, HMIs, historians, and remote access in an industrial control system?

Zone boundaries should be based on asset criticality, required communications, safety impact, and common security requirements, not just physical location. Typical IEC 62443 practice is to separate controller zones, supervisory SCADA/HMI zones, DMZ or industrial DMZ zones, and remote access zones so that each zone can be protected to a defined security level.

What documentation is expected for IEC 62443 zone and conduit design in EPC and panel engineering deliverables?

Common deliverables include a network architecture diagram, zone-and-conduit matrix, asset inventory, data flow list, security level assessment, and justification for inter-zone communications. These artifacts support IEC 62443-3-2 risk assessment and help demonstrate that security requirements are traceable through design, procurement, and commissioning.

How do IEC 62443 zones and conduits support European compliance on industrial automation projects?

IEC 62443 is widely used on European projects because it provides a structured method to implement defense-in-depth for industrial automation systems and to align cybersecurity controls with operational risk. While it is not itself an EU regulation, it is often used alongside EN IEC adoptions and project cybersecurity specifications to satisfy owner, insurer, and integrator requirements.

What security controls are typically implemented at a conduit between a control zone and an enterprise IT zone?

Typical controls include industrial firewalls with explicit allow rules, one-way data transfer where justified, remote access via MFA-protected jump hosts, logging, and protocol-aware inspection. IEC 62443-3-3 emphasizes restrictions on information flow, least privilege, and system integrity requirements at these boundaries.

Can a safety instrumented system (SIS) share a zone with a basic process control system (BPCS) under IEC 62443?

It is generally better to separate SIS and BPCS into distinct zones because they have different availability, integrity, and safety requirements. If they must communicate, the conduit should be tightly controlled and justified by risk assessment, with the functional safety design still governed by IEC 61511 and cybersecurity treatment aligned to IEC 62443.

How do SL-T, SL-A, and SL-C relate to zone and conduit design in IEC 62443?

Security levels are used to define the target resilience of a zone or conduit against specific threat categories, with SL-T as the target, SL-A as the achieved level, and SL-C as the component capability. Engineers should select SL-T during risk assessment under IEC 62443-3-2, then verify that the zone architecture and conduit controls can actually achieve that level under IEC 62443-3-3.

Related services

Related standards