12.1 O&M Lifecycle Overview

Maintaining the security effectiveness of an OT/IT network segmentation system requires a structured, recurring operations and maintenance program. Unlike IT systems where security updates can be applied rapidly, OT environments require carefully planned maintenance windows, extensive testing before changes, and a clear change management process that accounts for process safety implications. The lifecycle diagram below illustrates the complete O&M cycle, from daily monitoring tasks through annual security assessments and incident response procedures.

OT/IT Network Segmentation System Operations and Maintenance Lifecycle

Figure 12.1: O&M Lifecycle — Complete operations and maintenance lifecycle for the OT/IT DMZ system. Six phases arranged in a clockwise circular diagram: Daily Monitoring (dashboard, alerts, log review), Weekly Tasks (firewall rule review, IDS tuning, backup verification), Monthly Tasks (vulnerability scan, patch assessment, access review, compliance check), Quarterly Tasks (penetration test, DR drill, configuration audit), Annual Tasks (full security assessment, architecture review, staff training, certification renewal), and Incident Response (detect, triage, contain, eradicate, recover, post-incident review). The OT/IT DMZ shield icon is at the center.

12.2 Maintenance Schedule

The maintenance schedule defines the specific tasks, their frequency, responsible parties, and estimated effort for each maintenance activity. The schedule is designed to ensure that the security posture of the segmentation system is continuously maintained without requiring excessive operational overhead. Tasks are organized by frequency to enable efficient scheduling and resource planning.

Frequency Task Responsible Party Estimated Effort Documentation Required
DailyReview security dashboard and IDS alerts; triage and investigate anomaliesSOC / OT Security Analyst30–60 minDaily alert log
Verify firewall HA status and system health (CPU, memory, disk)OT Security Analyst15 minHealth check log
Review syslog for authentication failures and policy violationsOT Security Analyst15 minDaily security log
WeeklyReview and clean up firewall rule hit counts; identify unused rulesOT Security Engineer1–2 hoursRule review report
Tune IDS alert thresholds; review and close false positive alertsOT Security Engineer1–2 hoursIDS tuning log
Verify backup integrity: test restore of firewall configuration backupOT Security Engineer1 hourBackup verification log
MonthlyRun OT-safe vulnerability scan; assess and prioritize findingsOT Security Engineer4–8 hoursVulnerability scan report
Assess available patches for all DMZ and OT systems; create patch planOT Security Engineer + OT Engineering2–4 hoursPatch assessment report
Review and recertify all user access rights (least privilege review)OT Security Engineer + Plant Manager2–4 hoursAccess review sign-off
Compliance check against IEC 62443 / NIST SP 800-82 control requirementsOT Security Engineer2–4 hoursCompliance check report
QuarterlyConduct penetration test of IT-OT boundary; verify no new paths existExternal Security Firm1–2 daysPenetration test report
Conduct disaster recovery drill: simulate firewall failure, test failover and recoveryOT Security Team + Plant Operations4–8 hoursDR drill report
Full configuration audit: compare running config to approved baselineOT Security Engineer4–8 hoursConfiguration audit report
AnnualFull OT security assessment: architecture review, risk assessment updateExternal Security Firm + OT Security Team1–2 weeksAnnual security assessment report
Network architecture review: assess new threats, technology changes, business requirementsOT Security Architect2–3 daysArchitecture review report
Staff security awareness training: OT security, incident response, social engineeringOT Security Team4–8 hours per staffTraining completion records
System certification renewal: IEC 62443, NERC CIP, or applicable frameworkOT Security Team + ComplianceVariableCertification renewal documentation

12.3 Change Management Process

Change management for OT/IT segmentation systems must follow a rigorous process that balances the need for timely security updates with the operational constraints of OT environments. All changes to firewall rules, switch configurations, DMZ services, or access controls must go through the formal change management process. Emergency changes (required to respond to an active security incident) follow an expedited process but must still be documented and reviewed within 24 hours of implementation.

Change Type Approval Required Testing Required Maintenance Window Rollback Plan
Firewall Rule Addition (permit)OT Security Engineer + Plant ManagerLab test + staged deploymentScheduled maintenance windowRule deletion; revert to previous policy backup
Firewall Rule ModificationOT Security Engineer + CISOFull regression testScheduled maintenance windowRestore previous policy backup
Firewall Firmware UpgradeCISO + Plant ManagerLab test on identical hardwarePlanned outage windowDowngrade to previous firmware
Switch Configuration ChangeOT Security Engineer + Network EngineerLab test + connectivity verificationScheduled maintenance windowRestore previous configuration backup
DMZ Service ConfigurationOT Security EngineerService functionality testScheduled maintenance windowRestore previous service configuration
Emergency Change (active incident)CISO (verbal) + post-change written approval within 24hMinimal; document risk acceptanceImmediate (no window required)Revert within 24h if not confirmed effective

12.4 End-of-Life and Refresh Planning

OT/IT segmentation equipment has a defined operational lifecycle that must be proactively managed. Unlike OT field devices which may operate for 20+ years, network security equipment (firewalls, managed switches) typically has a vendor support lifecycle of 5–10 years. Planning for equipment refresh must account for the lead time required for procurement, testing, and the complexity of migrating configurations to new hardware without disrupting OT operations.

Equipment Type Typical Support Lifecycle Refresh Trigger Lead Time for Refresh Migration Complexity
Industrial Firewall (OT-FW)7–10 yearsEnd of vendor support; new threat capability gap6–12 monthsHigh (full policy migration, testing)
Industrial Managed Switch10–15 yearsEnd of vendor support; port density requirement change3–6 monthsMedium (VLAN/STP configuration migration)
OT IDS Sensor5–7 yearsEnd of vendor support; new OT protocol support needed3–6 monthsLow (sensor replacement, baseline re-learning)
Bastion Host / PAM Server5–7 yearsOS end of support; hardware failure3–6 monthsMedium (user database migration, policy export)
Fiber Optic Cabling20–25 yearsPhysical damage; connector degradation (>3dB loss)1–4 weeksLow (cable replacement)
Copper Cabling (Cat6)15–20 yearsPhysical damage; test failure1–2 weeksLow (cable replacement)