Back to Resources
Field Note April 2026 7 min read

Why the Purdue Model Still Matters in 2026

Despite claims that cloud-connected OT has "killed" Purdue, the model's logical zones remain the clearest language we have for discussing industrial segmentation with auditors and operators.

C

Cascadia OT Security

OT & ICS Security

LEVEL 5Corporate / ERPLEVEL 4Business SystemsLEVEL 3.5Industrial DMZLEVEL 3Operations · MES · HistorianLEVEL 2SCADA · HMILEVEL 1PLC · RTU · ControllersLEVEL 0Process · Sensors · ActuatorsPURDUE MODELDMZ = CONTROL PLANE

A recurring theme in OT security commentary is that the Purdue Enterprise Reference Architecture — the multi-level industrial zoning model that has anchored ICS security thinking since the 1990s — is obsolete. Cloud, IIoT, and flattened networks have supposedly made Purdue irrelevant.

We disagree. Not because Purdue perfectly describes any real facility — it never did — but because Purdue remains the clearest, most widely understood language we have for talking about industrial segmentation with auditors, operators, integrators, and insurers.

What Purdue actually is

The model, as codified in ISA-95 and extended in IEC 62443, defines a set of logical levels:

It is a logical model. It has never been strictly a physical topology. Flat networks that "violated" Purdue existed long before the cloud.

The "Purdue is dead" argument

Critics point out, reasonably, that modern architectures often have Level 1 devices directly reaching cloud services. Sensor telemetry bypasses the historian. Edge gateways federate across multiple sites. The neat hierarchical diagram does not describe reality.

True. But the critics conflate the model with the diagram. The model's real value is not the pretty layers — it is the separation of concerns between process control, supervision, operations management, and enterprise functions. That separation is more important than ever when any of those concerns can be addressed via cloud services.

Why we still use it

Four reasons:

A modernized reading

The way we use Purdue in 2026 engagements:

The bottom line

If a security consultant tells you Purdue is obsolete and wants to sell you a flat, cloud-native OT architecture, be skeptical. Not because Purdue is sacred — it isn't — but because the failure modes they are dismissing with hand-waving are the same failure modes that produce the majority of disclosed manufacturing ransomware events.

Segmentation is not a legacy concept. It is the concept. Purdue is just the shared vocabulary we use to talk about it.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call