Projet X-Wing — Architecture IT/OT Securisee

GENERALNetworkadvanced
Projet X-Wing — Architecture IT/OT Securisee — GENERAL network diagram

About This Architecture

Project X-Wing implements a Purdue-model industrial network architecture with strict IT/OT segmentation across five hierarchical levels, enforcing zero-trust access controls and deny-by-default filtering at every boundary. Data flows from Internet through dual-redundant firewalls (FW1 HA cluster) into the enterprise IT zone (SIE), then through an industrial DMZ (FW2) to production systems (SII) running 3D printers and SCADA supervision, with blockchain-based immutable traceability for aerospace and medical device compliance. The design combines Active/Passive firewall failover, ZTNA gateways with MFA, bastion hosts with session logging, and micro-segmentation via FW4 to enforce least-privilege access and exhaustive audit trails across all zones. This architecture demonstrates ISA/IEC 62443 hardening practices critical for high-availability industrial environments handling regulated manufacturing. Fork this diagram on Diagrams.so to customize firewall rules, add site-specific VLANs, or integrate your own OT protocols and compliance frameworks.

People also ask

How do you design an ISA/IEC 62443-compliant industrial network that separates IT and OT zones while maintaining high availability and audit compliance?

Project X-Wing uses the Purdue model to segment five hierarchical levels (Internet, IT/SIE, DMZ, production/SII, and field devices) with dual-redundant firewall clusters, zero-trust ZTNA gateways requiring MFA, and deny-by-default rules. Blockchain-based traceability logs all production events immutably, meeting aerospace (EN 9100) and medical (ISO 13485) compliance while bastion hosts and micro-s

industrial-securityISA/IEC-62443Purdue-modelzero-trustOT-IT-segmentationfirewall-HA
Domain:
Security
Audience:
Industrial security architects designing ISA/IEC 62443-compliant OT/IT networks with zero-trust segmentation

Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.

Generate your own network diagram →

About This Architecture

Project X-Wing implements a Purdue-model industrial network architecture with strict IT/OT segmentation across five hierarchical levels, enforcing zero-trust access controls and deny-by-default filtering at every boundary. Data flows from Internet through dual-redundant firewalls (FW1 HA cluster) into the enterprise IT zone (SIE), then through an industrial DMZ (FW2) to production systems (SII) running 3D printers and SCADA supervision, with blockchain-based immutable traceability for aerospace and medical device compliance. The design combines Active/Passive firewall failover, ZTNA gateways with MFA, bastion hosts with session logging, and micro-segmentation via FW4 to enforce least-privilege access and exhaustive audit trails across all zones. This architecture demonstrates ISA/IEC 62443 hardening practices critical for high-availability industrial environments handling regulated manufacturing. Fork this diagram on Diagrams.so to customize firewall rules, add site-specific VLANs, or integrate your own OT protocols and compliance frameworks.

People also ask

How do you design an ISA/IEC 62443-compliant industrial network that separates IT and OT zones while maintaining high availability and audit compliance?

Project X-Wing uses the Purdue model to segment five hierarchical levels (Internet, IT/SIE, DMZ, production/SII, and field devices) with dual-redundant firewall clusters, zero-trust ZTNA gateways requiring MFA, and deny-by-default rules. Blockchain-based traceability logs all production events immutably, meeting aerospace (EN 9100) and medical (ISO 13485) compliance while bastion hosts and micro-s

Projet X-Wing — Architecture IT/OT Securisee

Autoadvancedindustrial-securityISA/IEC-62443Purdue-modelzero-trustOT-IT-segmentationfirewall-HA
Domain: SecurityAudience: Industrial security architects designing ISA/IEC 62443-compliant OT/IT networks with zero-trust segmentation
0 views0 favoritesPublic

Created by

April 29, 2026

Updated

April 29, 2026 at 11:25 PM

Type

network

Need a custom architecture diagram?

Describe your architecture in plain English and get a production-ready Draw.io diagram in seconds. Works for AWS, Azure, GCP, Kubernetes, and more.

Generate with AI