7.1 Supporting Systems Ecosystem

A complete OT/IT network segmentation solution is not limited to the boundary devices themselves. It requires a carefully integrated ecosystem of supporting systems that provide identity management, time synchronization, log aggregation, patch delivery, asset inventory, and threat detection capabilities. Each supporting system has a defined integration point with the Industrial DMZ and must be connected through controlled, audited pathways. The diagram below shows all supporting systems integrated into a single comprehensive view, illustrating the data flows and integration points for each system.

OT-IT Network Segmentation Supporting Systems Integration Diagram

Figure 7.1: Supporting Systems Integration Diagram — All supporting systems connected to the Industrial DMZ cabinet: SIEM Platform, Asset Management/CMDB, Patch Management Server (top/IT services, blue); VPN Gateway, MFA Server, Certificate Authority/PKI (left/security services, orange); NTP Time Sync, DNS Resolver, Syslog/Log Management (right/infrastructure services, blue); Industrial Historian, OT IDS/Anomaly Detection, Vulnerability Scanner (bottom/OT services, green). All data flows labeled.

Supporting System Function Integration Point Data Flow Direction Protocol/Interface
SIEM PlatformCentralized security event correlation and alertingSyslog Collector in DMZOT → DMZ → SIEM (one-way)Syslog/CEF over TCP 514
Asset Management / CMDBOT asset inventory, configuration trackingOT IDS passive discovery + DMZ APIBidirectional (read-heavy)REST API via DMZ
Patch Management ServerControlled delivery of patches to OT systemsFile Transfer Gateway in DMZIT → DMZ → OT Patch Staging (one-way)SFTP/HTTPS with AV scan
VPN / Remote Access GatewayEncrypted remote access tunnel for O&M staffO&M Access Zone VPN ConcentratorInternet → O&M Zone → DMZ BastionIPSec/SSL VPN
MFA Authentication ServerMulti-factor authentication for all privileged accessO&M Access Zone MFA ServerBidirectional (auth verification)RADIUS/LDAP over TLS
Certificate Authority / PKICertificate issuance for device and user authenticationDMZ PKI relayBidirectional (cert management)SCEP/CMP/HTTPS
NTP Time Sync ServerAccurate time synchronization for all OT devicesNTP Relay in DMZIT NTP → DMZ Relay → OT devicesNTP/PTP UDP 123
DNS ResolverControlled DNS resolution for OT devicesDNS Relay in DMZOT → DMZ DNS → IT DNS (whitelist only)DNS UDP/TCP 53
Syslog / Log ManagementLog collection, storage, and retentionSyslog Collector in DMZOT → DMZ → Log ManagementSyslog TCP/UDP 514
Industrial HistorianLong-term process data storage and analyticsHistorian Relay in DMZOT Historian → DMZ Relay → IT HistorianOPC UA / REST API
OT IDS / Anomaly DetectionPassive OT traffic monitoring and threat detectionPassive TAP on OT segmentsOT traffic → IDS (passive, no injection)Passive mirror/TAP
Vulnerability ScannerPeriodic OT asset vulnerability assessmentControlled scan via DMZDMZ → OT (scheduled, read-only)OT-safe scan protocols

7.2 Identity and Access Management Integration

Identity and access management (IAM) integration is one of the most complex aspects of OT/IT segmentation. The OT environment typically has its own user accounts and access controls, which may not be synchronized with the IT Active Directory or LDAP. The recommended approach is to integrate OT system authentication with the enterprise IAM through the DMZ, using LDAP over TLS or SAML federation, while ensuring that the OT systems retain local authentication capability as a fallback for emergency access when the DMZ is unavailable.

Access Type Authentication Method Authorization Source Session Control Audit Requirement
Remote O&M (external vendor)VPN + MFA (TOTP/hardware token)PAM role-based accessJIT access, time-limited sessionFull session recording (video + keystroke)
Remote O&M (internal staff)VPN + MFA (TOTP)AD group + PAM roleSession timeout after 30 min inactivitySession recording, command log
Local HMI/EWS accessLocal account + smart card or PINLocal OT user databaseAuto-lock after 10 min inactivityLocal audit log forwarded to SIEM
Emergency accessBreak-glass account (physical safe)Local account onlyDual-person authorization requiredMandatory post-incident review
Service account (system-to-system)Certificate-based (mTLS)PKI certificate policyAutomated, no interactive sessionCertificate usage log

7.3 Patch Management Integration

Patch management for OT systems is significantly more complex than for IT systems. OT vendors often require specific patch testing procedures, and patches must be validated against the specific hardware and software configuration of the target system before deployment. The patch management integration must support a staged workflow: patch download to IT patch server, transfer through the file gateway with content scanning, staging in the OT patch staging server, testing in a lab environment, and finally controlled deployment to production systems during scheduled maintenance windows.

Patch Stage Location Activities Approval Required Rollback Capability
Download & VerificationIT Patch ServerDownload from vendor, verify hash/signatureIT SecurityN/A
Transfer to OT StagingFile Transfer Gateway → OT Patch StagingAV scan, file type check, size limit, audit logOT SecurityDelete from staging
Lab TestingOT Lab EnvironmentInstall on identical hardware, functional test, regression testOT EngineeringRestore lab from snapshot
Production DeploymentTarget OT SystemScheduled maintenance window, pre-deployment backup, install, verifyPlant Manager + OT SecurityRestore from pre-deployment backup
Post-Deployment VerificationTarget OT SystemFunctional test, process behavior verification, IDS baseline updateOT EngineeringRollback if verification fails