What is a DMZ (Demilitarized Zone)?

A DMZ (Demilitarized Zone) is an isolated network segment placed between an internal network (such as IT or OT) and an external network (such as the internet).

The purpose of a DMZ is to shield sensitive systems while still making certain services or systems securely available from outside (e.g. for Remote Access, data exchange or Monitoring).


🧱 What does a DMZ do?

A DMZ:

  • Isolates external access from the internal network
  • Limits the risk of a breach: attackers do not land directly on the internal network
  • Enables controlled communication between IT and OT, or between the internet and internal systems

📦 Examples of systems in a DMZ

System Function within the DMZ
Jump server Centralised access to internal systems
Data broker / proxy Forwarding SCADA/MES data to external parties
Historian replication Synchronisation of process data to IT or cloud
Remote access gateway Secured access for suppliers or maintenance teams
Web server / API gateway Publishing services without direct access to internal systems

🔐 How is a DMZ secured?

  • Firewalls on both sides: one between DMZ ↔ internet, one between DMZ ↔ internal network
  • Traffic whitelisting: only explicitly permitted communication
  • Monitoring and logging: inspection of access and behaviour within the DMZ
  • No direct connections between the internet and OT/SCADA systems

🔄 DMZ in industrial networks (Purdue model)

In an OT environment, the DMZ typically sits between:


✅ Benefits of a DMZ

  • Improves network segmentation and security
  • Enables secure external access without internal risk
  • Supports compliance (e.g. ISO 27001, IEC 62443)
  • Limits damage during a breach to the DMZ layer

📌 In summary

A DMZ is an additional security layer between the internal network and the outside world, enabling controlled access without exposing critical systems such as SCADA or MES directly.