Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
IEC 62443

Physical Enforcement of Industrial Automation Security

IEC 62443 defines zone and conduit requirements for industrial control system security. Firevault Control provides the physical enforcement layer that ensures zones are truly separated and conduits are genuinely controlled.

Back to Control
Control

IEC 62443

IEC 62443 requires zones and conduits. If those zones are defined by firewall rules rather than physical separation, every firewall misconfiguration is a potential zone boundary failure.

SL 4

Security Level achievable with physical enforcement

100%

Zone boundary physical enforcement

9

Control modules mapping to IEC 62443 requirements

Full

Automated compliance evidence generation

The Compliance Gap

Software-only zone enforcement falls short.

Logical vs Physical Zones

IEC 62443 defines zones and conduits, but most implementations rely on firewalls and VLANs that can be bypassed through misconfiguration or compromise.

Purdue Model Erosion

The Purdue model's hierarchical separation erodes as organisations connect Level 3 systems to cloud services and remote access platforms.

Evidence Gaps

Demonstrating continuous zone enforcement to auditors is difficult when boundaries are defined in software configurations that change frequently.

The Scenario

Scenario: Zone Boundary Failure During Audit

During an IEC 62443 certification audit, the assessor discovers that a firewall rule change made three months earlier had inadvertently created a path between Level 2 (control system) and Level 4 (enterprise) zones. The change was part of a routine maintenance update and had passed through the change management process without flagging the zone boundary violation. For three months, the control system zone was directly reachable from the enterprise network. With Firevault Control, zone boundaries are physical. No software change, configuration error, or routine maintenance can create a path between zones without explicit, multi-party authorised physical activation.

"We passed our IEC 62443 assessment in January. By April, a routine firewall change had created a path from our enterprise zone directly into the control system zone. Nobody noticed for three months. The zone boundary existed only as long as the firewall rules were correct."

Framework Mapping

Physical compliance with IEC 62443.

Industrial organisations achieve demonstrable IEC 62443 compliance through physical zone enforcement rather than software-defined boundaries. Zone boundaries cannot be bypassed through misconfiguration. Conduits are governed, time-limited, and fully audited. Compliance evidence is generated continuously and preserved in tamper-proof archives.

  • Physical zone boundaries that cannot be misconfigured
  • Governed, time-limited conduits with full audit capture
  • Continuous compliance evidence between assessments
  • Direct mapping to Purdue model levels
  • Tamper-proof audit logs for assessor review
  • Air-gapped evidence preservation
Fracture

Fracture — Zone Boundary Enforcement

Module 1 of 4

Provides physical enforcement of IEC 62443 zone boundaries. Zones are separated at the physical connectivity level, ensuring that no software misconfiguration can create an unauthorised conduit between zones.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Physical Zone Enforcement

Zone boundaries are physical, not logical. No software change can create an unauthorised path between zones regardless of privilege level.

Conduit Control

Every conduit between zones requires multi-party authorisation, operates within defined time windows, and generates full audit evidence.

Continuous Evidence

Automated logging generates continuous IEC 62443 compliance evidence, eliminating the gap between point-in-time assessments.

Purdue Model Alignment

Control modules map directly to Purdue model levels, providing clear, auditable alignment between your architecture and the standard.

Audit-Ready Logs

Tamper-proof logs record every zone boundary state change, conduit activation, and access authorisation for assessor review.

Evidence Preservation

Air-gapped compliance evidence archives ensure audit records persist independently of any network-connected systems.

Demo to Live

Adoption Guide

Step 1

Zone and Conduit Assessment

Map your current IEC 62443 zone architecture and identify where logical boundaries should be replaced with physical enforcement.

Step 2

Physical Zone Design

Design physically enforced zone boundaries with Control modules at each conduit, aligned to your target Security Level.

Step 3

Compliance Validation

Deploy in a representative zone boundary with full evidence generation to validate compliance claims before your next assessment.

Step 4

Full Zone Enforcement

Physical enforcement across all zone boundaries with continuous compliance evidence and tamper-proof audit archives.

Step 1

Zone and Conduit Assessment

Map your current IEC 62443 zone architecture and identify where logical boundaries should be replaced with physical enforcement.

Step 2

Physical Zone Design

Design physically enforced zone boundaries with Control modules at each conduit, aligned to your target Security Level.

Step 3

Compliance Validation

Deploy in a representative zone boundary with full evidence generation to validate compliance claims before your next assessment.

Step 4

Full Zone Enforcement

Physical enforcement across all zone boundaries with continuous compliance evidence and tamper-proof audit archives.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy