Firevault - Disconnect to Protect®️ Offline Secure Storage for individuals, boardrooms and businesses data
Create your vault
A diagram of the Purdue Model with six levels, from Level 0 (Physical Process) to Level 4 (Enterprise Network), highlighting how Firevault acts as a Secured Offline Digital Vault to Disconnect to Protect critical OT and IT systems at each layer.

Updated July 2025 | Estimated read time: 10 minutes | Published by Firevault



What Is the Purdue Model?

The Purdue Enterprise Reference Architecture (PERA), often just called the Purdue Model, is a layered model for industrial control systems (ICS). It defines how information and control flow through enterprise and operational technology environments, from the boardroom to the sensor.

Originally developed in the 1990s to separate enterprise IT from OT (Operational Technology), it’s still used today to model cybersecurity zones and enforce access restrictions between layers of industrial operations.

The 6 Levels of Purdue Architecture

Level Scope Description
Level 5 Enterprise Corporate IT, cloud, email, ERP
Level 4 Business Logistics Systems SCADA servers, MES, reporting dashboards
Level 3 Site Operations Manufacturing execution, plant-level command
Level 2 Cell/Area Zone Process control systems, HMI, PLC supervisory
Level 1 Basic Control Programmable logic controllers (PLCs), RTUs
Level 0 Process Physical sensors, actuators, field devices

Why It Matters for Industrial Security

The Purdue Model enforces a separation of duties between IT and OT. Each level is meant to have controlled access to adjacent levels—enabling command flow down and data flow up.

This matters because in most cyber incidents involving critical infrastructure, attackers exploit:

  • Weak segmentation between levels (e.g., Level 3 to Level 1 jump)
  • Exposed SCADA systems at Level 4
  • Remote access from Level 5 reaching into Level 2/1 without strict controls

Ransomware, wiper malware, and remote access Trojans (RATs) have successfully crossed levels in real-world attacks—including Colonial Pipeline and Triton.

Known Weaknesses & Attack Paths

Despite its design, Purdue isn’t immune. In fact, when improperly enforced, it introduces a false sense of security. Common failure modes include:

  • Flat networks: All levels can “see” each other—no real segmentation
  • Unmonitored OT protocols: Modbus, DNP3, OPC exposed to L3/L4
  • Shadow IT: Ad-hoc engineering workstations bridging levels
  • Legacy hardware: No patching, no authentication, high fragility

This creates the perfect environment for lateral movement and stealthy persistence.

Where Firevault Fits

Firevault – Offline Digital Vault

Firevault introduces a completely new layer: Offline Isolation. It sits outside Purdue entirely—removing the data that attackers target:

  • No attack path: Vaults are physically disconnected and inaccessible from any Purdue layer
  • No credential risk: Access requires both physical possession and verified identity
  • No ransomware payload impact: Backups, control files, or IP can’t be encrypted if offline

Think of Firevault as your Purdue Level -1: A clean, unreachable mirror of crown-jewel data that operational continuity depends on.

How CSPaaS Strengthens Purdue

Firevault CSPaaS overlays the Purdue Model with forensic-grade, real-time control and segmentation.

  • Level 3 Isolation: Disconnects the most common attack path from enterprise to ICS via jump servers or MES systems
  • Level 2–1 Control: Locks traffic flow from OT workstations to PLCs unless validated by policy
  • Policy Enforcement Modules: Each Firevault module (Lock, Relay, Fracture, Vault) aligns with Purdue zones—offering switch-based or virtual enforcement that is tamper-evident
  • Zero Trust for ICS: Segmentation isn’t just logical—it’s physical, timed, identity-locked, and logged

CSPaaS enables policy at the power level, not just at the port.

Framework & Compliance Alignment

The Purdue Model underpins several ICS/OT frameworks—Firevault reinforces them with real-world enforcement:

  • IEC 62443: Aligns to zone-conduit models with enforced disconnection
  • NIST 800-82: Supports industrial control segmentation and restoration
  • NIS2 & GDPR: Isolates personal or operational data, aiding legal compliance
  • Zero Trust for OT: Makes implicit trust impossible—nothing runs unless validated

Frequently Asked Questions

Is the Purdue Model still relevant?
Yes, but only when implemented rigorously. Firevault makes it defensible by removing exploitable assets and enforcing segmentation in hardware.
How does Firevault avoid Purdue path attacks?
Vaults are physically air-gapped—outside the network. Even if every Purdue level is compromised, Firevault remains unreachable.
Can I apply CSPaaS retroactively?
Yes. CSPaaS modules are deployable to legacy environments with minimal disruption—supporting isolation without overhauling infrastructure.
Why do I need Firevault if I already segment networks?
Segmentation without isolation is delay, not prevention. Vaults remove data from the blast radius completely.

Firevault’s Verdict

The Purdue Model gave OT environments a roadmap. But attackers have found every shortcut and hidden staircase between the layers.

Firevault puts your most critical data behind an invisible, untouchable, and unhackable wall.

CSPaaS makes Purdue real again—by enforcing it in ways software firewalls and VLANs can’t.

If your OT environment matters, Firevault should be the layer below Layer Zero.

↑ Back to top

Leave a Reply

Discover more from Firevault - Disconnect to Protect®️

Subscribe now to keep reading and get access to the full archive.

Continue reading