Part of the PROTECT Playbook ← Return to Hub

ZTNA and iDMZ—The Gold Standard for OT Remote Access

Requirement: This module addresses the secure brokering of remote OEM access to onboard OT environments, satisfying IACS UR E26 requirements for authenticated and controlled conduits.

In the maritime world, enabling remote access to critical Operational Technology (OT) networks is essential for maintenance. However, directly exposing these systems to the internet is an unacceptable risk.

The Challenge: Why VPNs & Jump Hosts Fail OT

Traditional “Secure” methods actually increase the vessel’s attack surface in two specific ways:

The “Full-Tunnel” Risk

Standard VPNs grant Layer 3 access. Once an OEM connects, their laptop is “virtually” inside the ship. If that laptop is infected, the malware can scan and attack every PLC on the subnet via Lateral Movement.

The “Jump Host” Vulnerability

Maintaining a Windows Jump Host in the iDMZ requires constant patching. If left unpatched, it becomes a Permanent Beachhead for hackers to sit and wait for the right moment to pivot into the engine control system.

The Zero Trust Solution: Access is granted to the Service/Application (e.g., HMI Web Port 443), not the network. The user never “sees” the IP address of the PLC.

The Solution: ZTNA in the iDMZ

An iDMZ (Industrial DMZ) acts as a neutral buffer zone. Critically, it serves as the secure environment for the ZTNA Gateway.

ZTNA and iDMZ architecture for maritime OT

Fig 2.1: ZTNA Gateway Architecture for Multi-Vendor OT Environments.

The ZTNA Connection Flow

Unlike a VPN, which opens a “door” into your network and then asks for a key, ZTNA keeps the door hidden behind a brick wall. The connection is only “stitched” together once identity and health are proven.

1 Pre-Auth & Posture: The “Bouncer”

The Cloud Broker verifies the OEM’s identity via MFA. Simultaneously, it performs a Device Health Check. If the engineer’s laptop has a disabled firewall or an active virus, the broker kills the request before it even reaches the ship’s satellite link.

2 The “Dark” Gateway: Outbound Only

Standard firewalls have “Inbound Listeners” that hackers can scan. The onboard ZTNA Gateway uses Inside-Out Connectivity. It reaches out to the broker to “pick up” the authenticated user. To the rest of the internet, the vessel appears to have no open ports—it is effectively invisible.

3 App-Level Mapping: Zero Lateral Movement

Instead of joining the network (Layer 3), the user is bridged to a specific Application Socket (Layer 7). If they are authorized for the “CCTV HMI,” they cannot “see” the Engine Control System, even if it’s on the same physical switch.

Key takeaway: By using Step 3, you eliminate the risk of an OEM’s “dirty” laptop spreading a worm across the ship’s internal OT network.

Firewall and Policy Configuration

To implement this, the firewall must be configured with a “Default Deny” posture. Use the following logic to configure the iDMZ conduits:

Component Source Destination Service Action
Gateway Uplink iDMZ WAN HTTPS (443) PERMIT
OT Access iDMZ OT Zone App Specific PERMIT
Default Deny iDMZ (All) OT Zone ANY DENY
Protocol Verification & Baselining

Why is this required? Under IACS UR E26, “Least Privilege” isn’t a suggestion—it’s a mandate. You cannot protect what you haven’t baselined. Without this step, firewall rules are either too loose (leaving the vessel vulnerable) or too strict (risking a “False Positive” during maneuvering).

Eliminating “Shadow Access”

OEM documentation often requests broad access. Verification ensures you only open Functional Ports (e.g., Modbus/502), preventing port probing.

The 72-Hour Operational Safety Buffer

Ships have “Burst” traffic. A baseline must capture the vessel in all states to ensure safety-critical packets aren’t dropped:

  • Maneuvering: High-frequency thruster control traffic.
  • Steady State: Consistent navigation and engine telemetry.
  • Cargo Operations: Pump control and automated valve sequences.

Compliance Note: This process creates the Technical Justification record required by auditors to explain conduits between zones.

The Advantages of ZTNA 2.0 in the iDMZ

Continuous Trust Verification

Access is not just granted once; the ZTNA system continuously verifies identity and device health throughout the session.

Minimal Attack Surface

Hardened, purpose-built appliance. Drastically reduces the patching burden compared to a general-purpose Windows/Linux server.

Granular Control

Policies are enforced based on identity and application, allowing multi-vendor access without complex firewall rules.

Implementing the iDMZ with ZTNA maintains the absolute security and integrity of a vessel’s critical operational systems.

Next Section

OT Password Policy & RBAC

OT Password Policy & RBAC Regulatory Context: This module details the implementation of IACS UR E27 (Section 4.2). It fo...

Scroll to Top