top of page

Enhancing OT Network Security with a Comprehensive Systems Upgrade

  • Writer: GPA
    GPA
  • Oct 6
  • 2 min read

Updated: 2 days ago


A major paper mill faced growing concerns about the security of its flat, minimally segmented Operational Technology (OT) network. Though stability issues were minor, the mill prioritized strengthening cybersecurity to protect critical infrastructure.


The Challenge

The mill’s existing OT environment consisted of a flat network architecture* with no VLAN segmentation, leaving the system vulnerable to potential cyber threats. The lack of network segmentation risked lateral movement by attackers and complicated efforts to enforce strict access control. The site needed a robust network overhaul designed with industrial cybersecurity best practices to improve both security and operational reliability.


A network diagram titled “A Look Back 20 Years Ago” showing a traditional separation between IT and OT networks. The IT Network is displayed at the top, separated by a green line labeled “Air Gap.” Below, the OT Network includes a central distribution switch connected to multiple edge switches. Each edge switch connects to various devices, including DCS/PLCs, SCADA, HMIs, drive controllers, and motors. The layout illustrates isolated OT systems typical of older industrial network architectures. GPA logo is visible in the bottom-right corner.

GPA's Solution

GPA collaborated closely with the site to design and execute a complete OT network upgrade compliant with the NIST SP 800** industrial networking standards. These guidelines emphasize segmentation, access control, continuous monitoring, and risk management to reduce vulnerabilities and safeguard operational environments from cyber threats.


The key elements of the solution included:

  • Installation of a pair of firewalls configured in high availability (HA) failover mode to separate the OT network from the corporate IT network, ensuring continuous security even during device failure.

  • Design and implementation of a fully VLAN-based logical network segmentation strategy, with each segment assigned a distinct IP address space to isolate and protect specific OT functions.

  • Development of precise firewall rules to restrict communication between VLANs, allowing only essential traffic required for critical business operations while minimizing attack surface.

  • A detailed re-addressing effort to update IP schemes across the majority of OT devices and systems to align with the new segmented network infrastructure.

  • Reconfiguration of OT network switching to support the new logical VLAN infrastructure. Removal of unmanaged switching and replacement with managed switching for segmentation and extended network visibility.

  • Comprehensive testing of firewall deployment and inter-segment communication before going live during the mill’s planned annual outage to minimize operational disruption.

  • Creation of thorough network documentation and updated drawings reflecting the new segmentation, IP schema, firewall configurations, and network topology to support ongoing management and future upgrades.


Deployment and Results

The deployment involved installing the firewall devices, configuring VLANs and routing, and executing the IP address overhaul per the segmentation design. This process strengthened network security by creating robust boundaries between OT systems and corporate IT, limiting unauthorized access and increasing threat containment capabilities.


Key benefits realized included:

  • A strong, NIST-backed security architecture reducing vulnerability to cyber-attacks.

  • Improved network stability with clearly defined manageable segmentation.

  • Enhanced control over inter-device communication through firewall governance.

  • Seamless migration coordinated with the mill’s maintenance schedule, avoiding downtime.

  • A future-proofed OT network infrastructure ready to support ongoing security and operational needs.


Conclusion

A layered network diagram labeled “GPA” illustrating the modern ISA-95 Purdue Model for IT and OT integration. The chart is divided into six levels:

Level 0 (Physical Process): Sensors, actuators, and drives.

Level 1 (Basic Control): PLCs, I/O modules, DCS & controllers, and PCUs.

Level 2 (Supervisory Controls): SCADA, HMIs, and servers.

Level 3 (Operations Systems): Active Directory.

Level 3.5 (DMZ): Jump server, antivirus, patch management, and historian, separated by a firewall.

Level 4 (Enterprise): IT security, SOC, and SIEM.

The left side of the diagram is labeled OT (Operational Technology), and the top side IT (Information Technology), showing a connected but segmented architecture for secure industrial control systems.

This comprehensive OT network systems upgrade project exemplifies how adopting industry cybersecurity frameworks such as NIST SP 800 and implementing logical segmentation can transform a flat, minimally secure network into a resilient, segmented, and highly secure operational environment. GPA’s expertise ensured a smooth transition that met the mill’s security and reliability goals with minimal disruption.


A wide-angle view of a large industrial warehouse or paper mill with high ceilings, exposed beams, and bright overhead lighting. The facility floor is spacious and organized, featuring tall stacks of large brown paper rolls arranged in rows. Forklifts are visible moving materials, and safety barriers, yellow railings, and painted floor lines help separate traffic areas. The environment is clean, well-lit, and designed for heavy material handling and storage.

*flat networks can be described as an outdated network design where all devices on the network reside on the same subnet, lacking any internal segmentation or security controls like firewalls or VLANs


**the NIST SP 800 standards provide a comprehensive framework to help organizations protect their critical systems by defining how to securely design, monitor, and manage network infrastructure

Electronic Circuit Board

READY TO EMBRACE THE FUTURE?

At GPA, we help you embrace the future of manufacturing with expert guidance and innovative solutions. Whether optimizing processes or exploring growth, we’re here to keep you ahead in an evolving industry.

bottom of page