Separating OT Network from Corporate Network
Overview
In the design and implementation of your operational technology network, you must use segregation mechanisms to keep it separate from your corporate network. This helps restrict access to the MasterPacT, ComPacT, and PowerPacT intelligent modular unit.
In particular, you must consider:
-
Using firewalls
-
Creating demilitarized zones
-
Using intrusion detection system (IDS) and/or intrusion prevention system (IPS) solutions
-
Implementing security policies and training programs
-
Defining incident response procedures
Guidelines for designing an operational technology network, and keeping it separate from the corporate intranet are issued and updated by specialized organizations (for example, NIST) and standardization bodies (for example, ISO, IEC/IEEE). Refer to these publications to address the points listed above.
In addition to the above precautions, you must also follow the general guidelines and recommendations for segregating your networks given in How Can I Reduce Vulnerability to Cyber Attacks?.