Integrate OT Cybersecurity into Industrial Network Design and Architecture

URN: TECDT611405
Business Sectors (Suites): IT(Cyber Security)
Developed by: ODAG
Approved: 2025

Overview

This standard defines the competencies required to integrate cybersecurity into the design and architecture of Operational Technology (OT) networks and systems. It includes identifying security requirements, designing secure and resilient architectures, selecting appropriate controls, and ensuring that designs support safe and reliable industrial operations. It incorporates secure-by-design principles, resilience and redundancy, IT/OT convergence, and cloud or edge architectural considerations in line with recognised industry standards.

This standard is intended for engineers, architects, and OT cybersecurity specialists responsible for developing or reviewing industrial architectures.


Performance criteria

You must be able to:

  1. Analyse industrial network architectures to identify cybersecurity, resilience, and operational requirements.
  2. Design OT network zoning and segmentation to meet security, safety, and operational needs.
  3. Specify cybersecurity controls for OT architectures using secure-by-design principles and recognised standards.
  4. Integrate cybersecurity considerations into OT network and system design decisions.
  5. Collaborate with engineering, operations, and IT teams to incorporate security requirements into converged and hybrid architectures.
  6. Document OT architecture decisions and associated security controls in line with organisational and regulatory requirements.
  7. Review industrial network designs to ensure they meet security, resilience, and lifecycle-security objectives.
  8. Identify risks associated with architectural decisions and propose appropriate mitigation options.
  9. Align OT network designs with safety, regulatory, operational, and data-sovereignty requirements.
  10. Evaluate architectural dependencies, including cloud, edge, and vendor systems, to assess their security impacts across the system lifecycle.

Knowledge and Understanding

You need to know and understand:

  1. OT and industrial network architectures and their components.
  2. Zoning, segmentation, and conduit models relevant to OT security.
  3. Secure-by-design principles for industrial network and control architectures.
  4. Cybersecurity controls applicable to OT architectures.
  5. Approaches for integrating cybersecurity into network and system designs.
  6. IT/OT convergence and its impact on architecture and trust boundaries.
  7. Resilience and redundancy principles used in industrial architectures.
  8. Methods for identifying and evaluating architectural security risks.
  9. Regulatory, safety, operational, and data-sovereignty requirements influencing OT architecture.
  10. Lifecycle-security principles for maintaining secure architectures.
  11. Cloud, edge, and hybrid-architecture considerations relevant to OT environments.

Scope/range


Scope Performance


Scope Knowledge


Values


Behaviours


Skills


Glossary

OT (Operational Technology)

Systems used to monitor, control, or automate industrial processes.

ICS (Industrial Control System)

A collective term for control technologies such as PLCs and SCADA systems.

PLC (Programmable Logic Controller)

A ruggedised industrial computer used for automation and process control.

SCADA (Supervisory Control and Data Acquisition)

A system used to monitor, manage, and control geographically distributed industrial assets.

DMZ (Demilitarised Zone)

A network area that provides a buffer between IT and OT networks, enabling controlled data exchange.

Secure-by-Design

An approach where security controls and principles are embedded into systems and architectures from the earliest design stages.

IT/OT Convergence

The integration of information-technology systems with operational-technology systems, creating shared services and security dependencies.

Data Sovereignty

Regulatory or organisational requirements governing where operational or safety-related data may be stored, processed, or transmitted.

Edge Computing

Processing of data close to industrial devices or control systems rather than in a centralised data centre or cloud environment.


Links To Other NOS


External Links


Version Number

1

Indicative Review Date

2029

Validity

Current

Status

Original

Originating Organisation

ODAG Consultants Ltd.

Original URN

TECDT611405

Relevant Occupations

Information and Communication Technology Professionals

SOC Code

2139

Keywords

Operational Technology (OT), Cybersurity, Safety-critical systems, Cyber-physical systems