An Example of Network Security Architecture

Based on the defense-in-depth recommendations, see Securing Operational Technology (OT) Systems and Defense in Depth for details, the following details how to apply the recommendations to a typical network architecture by providing expanded detail on:

  • Security zones

  • Location and function of firewalls

  • Data flow between security zones

  • Device security settings

Note - These examples are limited to a single site network with no plant-to-plant communications.

Select from the options below to display the details required:

Last update - February 2026