SOLUTIONS
Corsha takes an Identity-first approach to OT cybersecurity ensuring that only trusted machines can access OT equipment. Corsha’s unique dynamic Identity Provider focused only on machines of all types and sizes and flavors, whether that is a vendor laptop trying to push updates, a workload in the cloud acting as a Digital Twin, or a Data history storing backups or streaming telemetry data.
At its core, the Purdue Model provides a structured hierarchical framework for ICS architecture. This framework efficiently organizes the diverse components within an ICS, empowering security professionals to implement tailored security measures at each level.
The Zone | Corsha Coverage | |
---|---|---|
Level 5 | External/ Vendor Support/ Cloud Access | Remote Access that can be scheduled, controlled, and monitored. Pin OT communication to trusted, controlled points in the cloud or vendor environments. |
Level 4 | This is the corporate IT network. Enterprise digital engineering platforms, databases, email servers, and other logistics-related systems that manage manufacturing operations and provide communication and data storage | Provide uniform identity and access for any machine whether that is a cloud workload, digital engineering platform, or a PLC on the floor. |
Level 3 | The Industrial Demilitarized Zone (IDMZ). Serves as a buffer between the IT and OT networks. Supports bidirectional control and data flow between OT and IT. | Corsha is tailored for secure data movement and automation across network boundaries, Corsha adds human-like one-time-use credentials to every request across OT and IT networks |
Level 2 | The devices that control the overall processes of the system, such as human-machine interfaces (HMIs) and SCADA software, which enable human operators to monitor and control the system. These are often laptops/ workstations or touch pendants | Proxy all requests into an HMI or SCADA software pinning incoming communication to only trusted machine clients. Start/stop access in real-time, monitor and audit every incoming request. |
Level 1 | the systems that supervise and direct the devices at Level 0, including Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and Intelligent Electronic devices (IEDs) | Proxy all requests into an PLC without modifying the PLC. Support for Level 1 standard protocols like OPC-UA |
Level 0 | The physical devices that form the foundation of the equipment, such as motors, pumps, sensors, and valves |
Level 0 is the physical devices that form the foundation of the equipment, such as motors, pumps, sensors, and valves.
Level 1 is the systems that supervise and direct the devices at Level 0, including Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and Intelligent Electronic devices (IEDs).
Level 2 involves devices that manage the overall processes of the system, such as human-machine interfaces (HMIs) and SCADA software, which enable human operators to monitor and control the system. These are often laptops/ workstations or touch pendants.
Level 3 facilitates the management of production workflows and includes batch management, manufacturing operations management (MOM), manufacturing execution systems (MES), and data historians. The Industrial Demilitarized Zone (IDMZ) serves as a buffer between the IT and OT networks. The IDMZ helps prevent infections within the IT environment from spreading to OT systems and vice versa.
Level 4 encompasses systems such as Enterprise Resource Planning (ERP) software, databases, email servers, and other logistics-related systems that manage manufacturing operations and provide communication and data storage.
Finally, Level 5 is the enterprise network, which is not an ICS environment but collects data from ICS systems for business decisions.