Industrial Segmentation Playbook
Define zones and conduits, apply least privilege, and stage enforcement without downtime.
Overview
QuantLayer segmentation uses identity + posture signals to enforce policy at the right point in the environment—edge gateways, jump hosts, industrial DMZ, and zone firewalls—so you can reduce lateral movement while maintaining operational continuity.
Zone & Conduit Design
Typical assets: jump hosts, patch repo, broker services. Allowed conduits (examples): IT → DMZ (admin), DMZ → OT (controlled), OT → DMZ (telemetry).
Typical assets: SCADA, HMI, PLC engineering stations. Allowed conduits (examples): DMZ → Control (approved ports), Control → Control (limited).
Typical assets: SIS controllers, safety workstations. Allowed conduits (examples): strictly isolated; exceptions require explicit approval.
Typical assets: gateways, sensors, edge compute. Allowed conduits (examples): Edge → DMZ/Cloud (egress only), local OT conduits as needed.
Staged Enforcement (No Downtime)
- 1) Observe: Deploy agents/gateways and collect baseline communications (who talks to whom, when, and on what ports).
- 2) Model: Group assets by function into zones. Convert observed communications into candidate allow-rules.
- 3) Simulate: Run policies in audit mode to detect what would be blocked before enforcing.
- 4) Enforce gradually: Start with high-confidence rules (known services). Roll out enforcement per site/line/cell.
- 5) Respond: Auto-quarantine anomalous paths, restrict remote access, and trigger runbooks for SOC/OT teams.
Recommended Controls
- Least privilege flows: allow only required ports/protocols between zones.
- Privileged remote access: force identity + posture check for jump hosts and vendor sessions.
- Immutable logging: record policy decisions, exceptions, and drift events for audits.
- Containment: quarantine devices or isolate a conduit when risk score crosses threshold.
Next Steps
- Create Zones & Conduits.
- View Network Topology.
- Download PDF.