Go back

Zones and Conduits

Also known as: IEC 62443 Zones and Conduits

Zones and conduits is the architectural model defined in ISA/IEC 62443 for partitioning an industrial automation and control system into security zones and the communication conduits that connect them. The model is used to apply targeted cybersecurity controls based on each zone's assigned security level.

Last updated: April 2026

Key Facts

Defined in
IEC 62443-3-2 (Security risk assessment for system design)
Concept type
Architectural partitioning model
Zone
Logical or physical grouping of assets sharing security requirements
Conduit
Communication path between zones (or sometimes within a zone)
Security Level (SL)
SL 1 to SL 4, applied per zone
Purpose
Targeted application of cybersecurity controls
Origin
ISA-99 / IEC 62443 framework
Typical exercise
Zone and conduit diagram for a specific plant
Covered in
IC32 (overview), IC33 (assessment exercise), IC34 (design)
Audience
OT security analysts, control engineers, system integrators

What are Zones and Conduits?

A zone is a logical or physical grouping of assets that share the same security requirements. Examples: a control room workstation zone, a PLC and field device zone, a historian database zone. A conduit is the communication path between zones (or sometimes within a zone), such as the network link between the control room and the PLC zone. Each zone is assigned a target Security Level (SL) based on its risk profile, ranging from SL 1 (protection against casual or coincidental violation) to SL 4 (protection against intentional violation by sophisticated attackers with extended resources). Conduits inherit security requirements from the zones they connect. The model lets practitioners apply targeted security controls rather than blanket measures.

Illustrative Zone and Conduit Layout

Asset GroupZoneSL TargetConnected To (via conduit)
Control room HMIsOperator zoneSL 2Engineering zone, Process zone
PLCs and field devicesProcess zoneSL 3Operator zone, Maintenance zone
Engineering workstationsEngineering zoneSL 2Operator zone, Enterprise zone
Enterprise ITEnterprise zoneOut of scope or SL 1Engineering zone (via DMZ conduit)

This is illustrative only. Real designs depend on specific plant topology, asset inventory, and the outcome of a formal IEC 62443-3-2 risk assessment.

How Zones and Conduits Relates to the IEC 62443 Standard

The zones-and-conduits model is foundational in IEC 62443 system design. IEC 62443-3-2 defines the assessment process for partitioning the IACS into zones and assigning target SLs. Once the partitioning is complete, IEC 62443-3-3 specifies the system requirements that each zone must meet to achieve its target SL. The model is also referenced indirectly throughout the certificate programme — IC33 (risk assessment) covers the partitioning process in depth, and IC34 (design) covers how to translate the zone model into specific control choices.

How Cybersecurity Training Providers Cover Zones and Conduits

Zones and conduits is rarely a standalone course. The concept is covered within IC32 (overview), IC33 (assessment exercise), IC34 (design choices), and other IEC 62443 courses. IC33 in particular runs delegates through a zone-and-conduit partitioning exercise as part of risk assessment training. Some providers offer dedicated 1-day workshops on zone-and-conduit design for engineers needing a focused refresher. An LMS supporting cybersecurity training needs to support diagram-based exercises, secure delivery of plant-specific case studies, and tracking of delegates' progress through the broader 62443 certificate programme where this concept fits.

Common Questions

How do I know how to partition a system into zones?

Through risk assessment under IEC 62443-3-2. Common groupings include the Purdue Reference Model level, function (control vs. supervision), trust boundary (vendor systems vs. internal), and physical location.

What's the difference between a zone and a conduit?

A zone is a group of assets. A conduit is the communication channel between zones. Both can have SL targets and security requirements, although conduits typically inherit from the zones they connect.

Does every system need formal zone-and-conduit design?

In principle, yes — it is the foundation of a 62443-compliant security architecture. In practice, the depth of formality scales with risk. Small systems may use a simple two-zone design; large plants may have dozens of zones.

What are the Security Levels (SL) in zone targeting?

SL 1: protection against casual or coincidental violation. SL 2: intentional violation using simple means. SL 3: intentional violation using sophisticated means with moderate resources. SL 4: intentional violation using sophisticated means with extended resources.

Train Your Delegates with Blend-ed

Cybersecurity training providers need an LMS that supports diagram-based exercises, secure case study delivery, and progression tracking through the IEC 62443 certificate programme. Blend-ed runs cohort-based scheduling, secure case study delivery, identity verification at exam, verifiable certificates, and audit-ready records.

Book a demo