L'aggiornamento che non puoi permetterti di ignorare: fine del supporto per Office 2016 e Office 2019

Leggi ora
Per le traduzioni dei siti utilizziamo l'intelligenza artificiale e, sebbene ci sforziamo di essere accurati, non sempre le traduzioni sono precise al 100%. La vostra comprensione è apprezzata.

Data Diodes and IEC 62443: The Keys to Staying Compliant

Condividi questo post

For industrial and manufacturing environments, ICS (Industrial Control Systems) are widely deployed, but these systems were engineered for safety, deterministic outputs, and uptime—not cyber exposure. PLCs, HMIs, historians, and distributed control systems often operate continuously and cannot tolerate disruption.

At the same time, manufacturers are under pressure to provide centralized monitoring across plants, integrating OT data with IT and SOC platforms to enable remote visibility, diagnostics, and even access to sensitive networks. This convergence introduces risk at the boundaries between zones.

Standards such as IEC 62443 assume that segmentation failures lead directly to operational risk, not just data exposure. In OT environments, cyber incidents can result in various catastrophic outcomes. Production shutdowns are among the most common: the Colonial Pipeline ransomware attack in 2021 forced a six-day shutdown of the largest refined fuel pipeline in the United States, triggering fuel shortages across 17 states and a presidential state of emergency, while 2019’s Norsk Hydro LockerGoga attack halted automated aluminum production across 40 countries at a cost of $70–80 million.

Equipment damage is equally real: attackers who breached a German steel mill in 2014 pivoted from the corporate network into production controls and prevented a blast furnace from shutting down safely, causing massive physical destruction — only the second confirmed cyberattack to inflict physical damage after Stuxnet.

Safety incidents represent the most alarming category: the TRITON malware deployed against Petro Rabigh in 2017—widely regarded as the first malware designed to cause human casualties—exploited a misconfigured firewall to reach safety instrumented systems and could have triggered toxic hydrogen sulfide releases or explosions had the attack not failed due to a coding error.

Environmental and public safety impacts are also demonstrated by incidents such as the cyberattack on Poland's energy sector in 2025, where threat actors destroyed HMI data, corrupted OT firmware, and caused loss of view and control between facilities and grid operators. More importantly, certain regions embed the IEC 62443 standard into law: the EU's NIS2 Directive, for which ISA/IEC 62443 is considered the primary compliance framework for industrial infrastructure, imposes fines of up to €10 million or 2% of global annual revenue for essential entities, along with personal liability for senior management — meaning any non-compliance condition may trigger significant financial and legal consequences for essential entities, along with personal liability for senior management — meaning any non-compliance condition may trigger significant financial and legal consequences.

While industrial firewalls and VLAN-based segmentation are often used to mitigate these kinds of risks, they also created significant challenges for operators. These solutions strictly depend on correct configuration across long system lifecycles while legacy OT protocols support is not always available and often lack sufficient authentication or validation. The nature of firewalls also permits bidirectional communication, and malware can traverse trusted return paths.

Logical segmentation helps, but it does not enforce separation. When IT or external networks can initiate communication into OT zones, significant risks are introduced simultaneously: Malware can pivot from IT to production systems where monitoring paths can be abused for control traffic with compromised credentials to bypass segmentation.

IEC 62443 is explicit: zones must be protected by enforceable conduits. A data diode enforces one-way communication at the physical layer which offers an excellent option like a fast pass to meet such requirements: data can leave a lower-level OT zone, but cannot return, regardless of software state or compromise. This directly supports IEC 62443 principles for clear zone boundaries, deterministic conduits, and no implicit trust between security levels.

With a data diode, manufacturers can export production metrics, replicate historians, stream alarms and logs, and support centralized monitoring all without allowing inbound traffic into control zones. It eases the process for security risk assessment as defined in Part 3-2.

Further reading into Part 3-3 regarding Security levels, the employment of a diode in design architecture maps strongly against SR 5.2 — Zone & Conduit Boundary Protection, SR 5.1 — Network Segmentation, SR 3.1 — Communication Integrity, and SR 7.6 — Network Segmentation for Availability. Diode not only helps reduce attack surfaces by restricting physical and logical access to systems and networks but also segment networks and controlling the traffic between them deterministically. This allows manufacturers to employ a defense in depth method by inserting new protection layers into some of most critical yet unchangeable network perimeters without introducing massive rebuild.

The shift is from logical segmentation to physical enforcement. Visibility is retained while control is not shared.

This monitors outbound data while keeping control systems isolated and making zone boundaries impossible to bypass. From a security posture standpoint, it eliminates inbound attack paths, reduces lateral movement risk, and offers superior protection against misconfiguration and protocol abuse.

By adopting this approach, manufacturers can ensure operational continuity with no impact on real-time control, no dependency on legacy protocol security, and keep stable, predictable operations. It also clears the path for alignment with IEC 62443 zone and conduit requirements, simplifies documentation and validation and provides substantial readiness with a defensible, repeatable architecture.

For industrial environments where zone separation must be enforced—not assumed—hardware-enforced, one-way data transfer solutions are being increasingly adopted. MetaDefender Optical Diode physically prevents any return path into the protected network — not through rules or policies, but through the absence of a light path capable of carrying inbound traffic.

Solutions such as MetaDefender Optical Diode are designed to support industrial-grade, standards-aligned isolation without disrupting operations.

Rimanete aggiornati con OPSWAT!

Iscriviti oggi stesso per ricevere gli ultimi aggiornamenti sull'azienda, storie, informazioni sugli eventi e altro ancora.