Loading
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

InformationInformation
This content is not available in your selected language.
Rockwell Automation logo
Products
Hardware
What's New in Hardware
Circuit & Load Protection Condition Monitoring Connection Devices Distributed Control Systems Drives Energy Monitoring Human Machine Interface (HMI) Independent Cart Technology Industrial Computers & Monitors Industrial Control Products Input/Output Modules Lighting Control
Motion Control Motor Control Network Security & Infrastructure Packaged Solutions Power Supplies Programmable Controllers Push Buttons & Signaling Devices Relays & Timers Safety Instrumented Systems Safety Products Sensors & Switches Signal Interface
Software
What's New in Software
Cloud Software
 
Design
Studio 5000 FactoryTalk Logix Echo Emulate3D Digital Twin Arena Simulation FactoryTalk Design Studio FactoryTalk Twin Studio FactoryTalk Vault
 
Analytics & Data
FactoryTalk Historian FactoryTalk Analytics FactoryTalk Analytics LogixAI FactoryTalk DataMosaix FactoryTalk Energy Manager Thingworx IIoT FactoryTalk Transaction Manager FactoryTalk Edge Manager Model Predictive Control
HMI
FactoryTalk View FactoryTalk Optix
 
MES
Plex MES FactoryTalk ProductionCentre FactoryTalk PharmaSuite Plex MES for Food & Beverage FactoryTalk CPGSuite Plex Quality Management System Plex Enterprise Resource Planning Plex Asset Performance Management Plex Production Monitoring Finite Scheduler FactoryTalk EIHub
 
Performance Monitoring
FactoryTalk Metrics OEE
 
Thin Client Management
ThinManager
Maintenance
Fiix CMMS FactoryTalk Analytics GuardianAI FactoryTalk AssetCentre FactoryTalk Remote Access FactoryTalk Network Manager Emonitor
 
Process
PlantPAx FactoryTalk Batch
 
Industrial Communications
FactoryTalk Linx
 
XR/Augmented Reality
Vuforia
Product Directory Allen-Bradley FactoryTalk
Services
Asset Optimization & Workforce Services
Asset Optimization Services Overview Equipment Repair Equipment Remanufacturing Repair and Inventory Agreements Integrated Service Agreements Remote Support & Monitoring Onsite & Field Services Safety Services Training Services
Cybersecurity & Network Infrastructure
Cybersecurity Industrial Network Infrastructure Pre-Engineered Network Solutions
Digital Thread
Overview
Production Automation
Overview Coordinated Drive System Solutions
Loading
LifecycleIQ Services
Solutions & Industries
Solutions
Advanced Motion & Robotics Asset Management Cybersecurity Data Operations & Analytics Digital Thread Digital Transformation Industrial Automation Control Industrial Components Networks & Infrastructure On-Machine Solutions
Packaged Solutions Process Solutions Production Automation Production Operations Management Safety Solutions  Scalable Control & Visualization Smart Manufacturing Sustainable Solutions Workforce Enablement
 
Solutions for
OEMs
Industries
Automotive & Tire Cement Chemical Entertainment Fiber & Textiles Food & Beverage Household & Personal Care Hydrogen Infrastructure Life Sciences
Marine Metals Mining Oil & Gas Power Generation Print & Publishing Pulp & Paper Semiconductor Warehouse & Fulfillment Water Wastewater
Loading
View Case Studies
Support
Documentation
Technical Documentation Center Product Drawings & Wiring Diagrams Product Certifications Release Notes Technical Specifications
Product Support
Downloads Selection & Configuration Management
Training
Webinars Workforce Development Training Instructor-led Courses Certificate Programs Job Aids Training Workstations Learning+ Training Subscriptions
Contact Us
TechConnect Support Customer Care Software Portal Help General Inquiries
TechConnect Support
TechConnect Support

Get the knowledge and assistance for solving your technical challenges.

Learn More about TechConnect
Compatibility and Downloads (PCDC) Knowledgebase Literature Library Engage Online Community
Sales & Partners
Find a Partner
Go to the Partner Finder
 
Our PartnerNetwork
PartnerNetwork Program Digital Partners Distributor Partners Licensed Developers
Original Equipment Manufacturer (OEM) Partners Strategic Alliance Partners System Integrator Partners Technology Partners
Order Online
Software Subscriptions E-learning Training Instructor-led Training Learning+ Training Subscriptions
What is the PartnerNetwork™?
What is the PartnerNetwork™?

Our Rockwell Automation PartnerNetwork™ program gives our customers access to the best people, products, services and solutions to meet manufacturing goals and bring The Connected Enterprise to life.

Explore Now
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Resources
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

Select country or region
  • India
  • Argentina
  • Australia
  • Belgique | Belgium
  • Brasil
  • Canada
  • Colombia
  • Czech Republic
  • Denmark
  • Deutschland
  • España
  • Finland
  • France
  • Hungary
  • Indonesia
  • Ireland
  • Israel
  • Italia
  • México
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Portugal
  • Puerto Rico
  • Romania
  • Russia
  • Schweiz | Suisse
  • Singapore
  • South Africa
  • Sweden
  • Turkey
  • Ukraine
  • United Arab Emirates
  • United Kingdom
  • United States
  • Österreich
  • 中国
  • 台灣, 中國
  • 日本
  • 한국
Select language
  • English
  • Deutsch
  • Español
  • Français
  • Italiano
  • Português
  • 日本語
  • 简体中文
  • 繁體中文
  • 한국어
Sign In Create an Account
Why Create an Account?
Create bills of materials, submit repair quotes, register products and more!

Manage your e-communication subscription preferences.

Manage your user profile.
Welcome, {0}
Residing Location
My Account Sign Out
Your recent searches
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
All
Products
Documents
Downloads
Suggested search terms
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
Results for "{0}"
View all results
Product results for "{0}"
Product Image
Product Image
Product Image
View all product results
Document results for "{0}"
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
View all document results
Download results for "{0}"
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
View all download results
Blog | Network Services
Recent ActivityRecent Activity
5 minute read

The Importance of an IDMZ in a Perimeterless World

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
High-tech blue padlock on shaded blue back ground indicating cybersecurity and information protection

Over the past decade, at some point, every manufacturer has struggled with the best way to protect their Industrial Control System (ICS) and the data, engineering, technologies, and products that it constitutes. An ICS needs to communicate with business systems but as the network security paradigm has evolved, how can manufacturers keep up?

Supply chain, energy management, lab testing, maintenance, regulatory data collection, and productivity management business systems all require data from manufacturing systems. The underlying technologies and protocols these systems use to retrieve that data involve various kinds of databases, web servers, remote access, and file transfers. Therefore, in order to protect an ICS from the security risks of business systems, the best method for protecting an ICS has been to architect a security boundary that separates the business systems from the ICS, called an Industrial Demilitarized Zone (IDMZ).

What is an IDMZ?

An IDMZ is a boundary that exists to create a buffer within a manufacturing or process facility between the business systems and the industrial control systems, which have different security requirements and share no inherent trust in each other. This boundary uses network and application security controls to manage the flow of data between the untrusted zones.

Years ago, cybersecurity existed in a completely “walled” world, physically speaking. Then in 2006, with little notice or fanfare at the time, a new way to store data was created. The public cloud, a third party provided server and network infrastructure delivered over the internet (AWS, Microsoft Azure, Google Cloud, IBM Cloud), has been changing the way IT organizations store data and handle their compute workloads ever since. Many IT organizations now use a hybrid cloud combining public cloud services with on-premises server infrastructure. As both the public network infrastructure and the public cloud become more reliable, more and more storage and compute is outsourced to third-party public cloud service providers.

In hindsight, it was inevitable that the public cloud would become the storage of choice for IT organizations. There was a time when huge server rooms were reserved for floor-to-ceiling physical server racks. The walls of those rooms constituted almost the entirety of IT security: the perimeter firewall. The hybrid cloud not only reduced the need for physical server storage space, but outgrew those rooms via virtualization. The firewall still exists; however, if a large portion or the entirety of your data storage and compute workloads live outside of the firewall, then that perimeter is no longer enough. To adapt to the shifting boundaries of the perimeter and new security threats that exists due to the exposure to the internet when accessing the public cloud, a new security paradigm was introduced: The Zero Trust Model.  

What is a Zero Trust model?

The Zero Trust model maximizes the principle of least privilege, where only the minimal amount of rights that are necessary to perform a task are granted to a user or system. This principle enforces a no-trust stance, only allowing data or communication between devices if the user, data, computer, and location is allowed. This moves away from the old “trust-everything-if-it’s-in-my-zone” model, to a “distrust-everything-unless-it-can-be-verified-in-multiple-ways” model.

The ICS threat landscape is evolving. Large-scale ransomware attacks such as WannaCry or the masquerading NotPetya and targeted attacks on critical infrastructure using malware such as Crash Override, Triton, or LookBack are becoming increasingly common. ICS environments and their administrators, whether they were aware or not, have always depended heavily on IT perimeter security. For even those with an IDMZ, the IT perimeter security was the first line of defense from the greater world. The IDMZ was the last line of defense.  As the IT perimeter disappears, it may be the only line of defense.

Can an ICS environment embrace the Zero Trust model?

If it were only that simple. A typical IT environment may be complex, but will share some commonalities:

  • Standard computer hardware with a lifecycle plan
  • Standard Operating System that is routinely patched
  • Standard business office software tools
  • Supported identity and access management solution for users and assets
  • Supported and updated means for an asset to identify and defend itself against an attack

An ICS environment consists of hundreds of different kinds of products of several generations made by a multitude of vendors that communicate using different protocols. These are all unique hardware platforms using their own custom firmware and software. Even the software-only solutions are only compatible with extremely out-of-date operating systems and in many cases, no longer supported operating systems. Even if a system uses an operating system that is still receiving patches, ICS personnel are always reluctant to do so in fear that implementing a patch will cause downtime, and their concerns are not unfounded.

So, for an ICS to exist “securely” in a Zero Trust Model, ICS assets will need to become as self-preserving as common IT assets. Let’s consider all the changes to the platforms and control system technologies required for this to be achieved:

  • Zero Trust immediately flips the bit from a 1 to a 0.
  • Currently, ICS devices trust anything that can communicate with them. They have no way to verify the user, device, location, or reason an asset is communicating with them, or what objects are being accessed. From their end, they have no way to verify when they initiate a connection.
  • Most ICS devices have no authentication mechanisms or no rules, logging, or administration when they do.
  • They have no way to detect when they are under attack, or if something is attempting to communicate with them abnormally.
  • There are no behavioral technologies that could identify previously unseen behavior or analyze the consequences of multiple actions.
  • Not to mention the cultural shift needed

For example, even if an ICS device requires authentication using the common username/password model, the device will be configured with the simplest credentials possible, be shared by everyone, and remain logged on, perpetually. From the technologies and skills required for plant personnel, to the security culture and the monitoring and administration, everything about the ICS will have to change. Oh, and make that shift without any impact to production!

Challenges with IDMZs

Not every company is ready to invest in an IDMZ – it can be challenging to design and painful to integrate within existing OT and IT network systems. In order to design and implement an IDMZ, an expert-level understanding is needed in the following areas:

  • Network security
  • Firewalls platforms and ACLs
  • Virtual server technologies
  • System Hardening
  • Application security
  • Domain Functionality and Security
  • Secure Data and File Transfer methods
  • Secure Remote Access Methods
  • and the list goes on…

To further the challenge, the IDMZ must then be supported by a team equally as knowledgeable in these aspects in order to maintain the infrastructure, approve network changes, and respond to security threats.

While the path to an IDMZ is not simple nor is it inexpensive, it’s worth doing the math to determine if it’s the right solution for you. Are the costs related to the IDMZ less than the cost of what it is protecting? If the IDMZ is protecting your entire ICS, it would be a very good investment. Considering the increasing threats to extremely vulnerable ICS environments, in a world without walls, it is actually the only complete protection available right now for your ICS.

Industrial Control Systems are not yet mature enough to exist with a reasonable tolerance of security risk in a perimeterless world. Defense-in-depth is strongly encouraged. However, until these devices can protect themselves and interact with external protection systems, an IDMZ remains the best defense for Industrial Control Systems. For now, the “inner wall” reinforced by an IDMZ must remain.

Learn more about how Rockwell Automation can help you create and maintain an IDMZ as part of a defense-in-depth approach to network security.

Published March 5, 2021


Josh Newton
Josh Newton
Senior Consultant of Network & Security, Rockwell Automation
Connect:
EmailEmail
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe

Recommended For You

Loading
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right
Company
About Us Accessibility Careers Diversity, Ethics and Integrity Engage Online Community Investor Relations Modern Slavery Statement Sustainability Trust Center
 
News & Events
Newsroom Press Releases Automation Fair Upcoming Events
 
Trending Topics
Cybersecurity Digital Transformation Smart Manufacturing The Connected Enterprise®
 
Training
Webinars Workforce Development Training
 
PartnerNetwork
Find a Partner What is the PartnerNetwork?
 
Our Brands
Allen‑Bradley FactoryTalk LifecycleIQ Services
Contact Us
TechConnect Support Customer Care General Inquiries How to Buy Report Ethical Concerns
Insights
Results Achieved Case Studies Blogs Automation Today Podcasts
BlogRockwell Automation's Blog
IN | EN
Legal Notices
Privacy & Cookies Policy
Email Preferences
Cookie Settings
Accessibility Settings
© 2025 Rockwell Automation
Rockwell Automation Home
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose