Skip to content Skip to footer

Microsegm entation vs. VLAN Segmentat ion for OT: Which Prevents Lateral Movement ?

Microsegm entation vs. VLAN Segmentat ion for OT: Which Prevents Lateral Movement ?

The Lateral Movement Problem in OT Networks

Ransomware attacks against industrial organizations increased 87% year-over-year in 2024, making OT the top ransomware target for four consecutive years. Dragos tracked 119 ransomware groups targeting industrial organizations in 2025 – a 64% increase from 2024. In nearly every case, the attack pattern was the same: gain initial access through an IT vector (VPN credentials, phishing, vulnerable web application), then move laterally until reaching OT systems that control physical processes.

Claroty found that 82% of verified OT intrusions used internet-facing remote access as the initial entry point. But initial access alone does not cause operational disruption. Lateral movement does. The attacker’s ability to traverse from the compromised entry point to SCADA servers, engineering workstations, historian databases, and safety systems determines whether the incident remains an IT security event or becomes an operational shutdown.

The SANS 2025 ICS/OT Security Survey confirmed that 40% of OT security incidents caused operational disruption. The question for security architects designing OT network defenses is not whether segmentation is necessary – it is which segmentation architecture actually prevents lateral movement in industrial environments.

This article compares microsegmentation vs. VLAN segmentation for OT networks across twelve evaluation dimensions, explains where each approach succeeds and fails, and provides a decision framework for selecting the right architecture based on OT maturity level and operational constraints.

How Does VLAN Segmentation Work in OT Networks?

VLAN (Virtual Local Area Network) segmentation operates at Layer 2 of the OSI model. It divides a physical network into multiple logical broadcast domains using managed switches. Each VLAN creates a separate broadcast domain – devices within the same VLAN can communicate directly, while traffic between VLANs must pass through a router or Layer 3 switch where access control lists (ACLs) can filter traffic.

In OT environments, VLAN segmentation typically follows the Purdue Model. Each Purdue level (Level 0 – physical process, Level 1 – basic control, Level 2 – area supervisory, Level 3 – site operations, Level 3.5 – IDMZ, Level 4 – enterprise) receives one or more dedicated VLANs. Inter-VLAN traffic is filtered through firewall rules or router ACLs at each boundary.

What VLAN Segmentation Does Well in OT

VLAN segmentation provides genuine value in OT environments. It reduces broadcast domain size, which improves network performance and limits the scope of broadcast storms. It provides basic isolation between Purdue levels, aligning with IEC 62443 zone requirements at a macro level. It is well understood by OT network engineers, compatible with existing managed switches, and does not require software agents on OT endpoints.

For organizations at the beginning of their OT segmentation journey – moving from a completely flat network to any level of segmentation – VLANs represent a practical, achievable first step.

Where VLAN Segmentation Fails in OT

The critical limitation of VLAN segmentation is what happens inside a VLAN. Within a single VLAN, all devices communicate freely with no access control, no traffic inspection, and no policy enforcement. If an attacker compromises one device in a VLAN containing 30 PLCs and 5 engineering workstations, the attacker can reach all 35 devices without crossing any security boundary.

CISA’s 2025 guidance stated explicitly that static zones and VLANs are no longer sufficient – segmentation must be dynamic and context-aware, factoring in identity, device posture, and behavioral signals.

The specific failures of VLAN segmentation in OT include:

No east-west traffic control. VLANs filter north-south traffic (between VLANs) but provide zero visibility or control over east-west traffic (within a VLAN). In OT environments, dozens of devices – PLCs, HMIs, RTUs, engineering workstations, historian servers – often reside in the same VLAN. Lateral movement within that VLAN is unrestricted.

Static policies. VLAN membership is based on switch port or MAC address – not on identity, device posture, or operational context. When a vendor connects a laptop to a switch port assigned to an OT VLAN, the laptop receives the same network access as the PLC on the adjacent port.

ACL sprawl. As organizations add exceptions and allow-rules to inter-VLAN ACLs, the rule sets grow unwieldy. One security architect described the result as VLANs that “look like Swiss cheese as allow-rules accumulate.” Misconfigured ACLs are a common finding in OT security assessments.

No identity awareness. VLANs do not know who is using a device or what application is generating traffic. A compromised HMI running ransomware generates traffic that is indistinguishable from legitimate HMI traffic at the VLAN level.

Reconfiguration requires physical changes. Moving a device to a different VLAN requires switch port reconfiguration or VLAN trunk changes – operations that OT teams avoid in production environments due to the risk of disrupting process control.

How Does Microsegmentation Work in OT Networks?

Microsegmentation operates at a fundamentally different level. Instead of dividing the network into broadcast domains, microsegmentation creates a security boundary around each individual endpoint or workload. Each device operates in its own security zone. Communication between devices requires explicit policy authorization – regardless of whether the devices are in the same VLAN, subnet, or physical network.

In OT environments, microsegmentation enforces policies based on identity attributes – device type, user identity, role, device posture, application, and operational context – rather than IP address or switch port. A policy might state: “Engineering Workstation EW-03 can communicate with PLC-07 on Modbus/TCP port 502, but only when accessed by a user in the OT Engineering AD group, during scheduled maintenance windows.”

Research published in the European Journal of Computer Science and Information Technology (2025) quantified the impact: microsegmentation alone achieves 87.3% lateral movement prevention, and when combined with Zero Trust principles, that figure reaches 95.8%.

Organizations exploring the fundamental differences between these approaches can find a detailed technical comparison of identity-based segmentation vs. network segmentation that covers deployment models, policy mechanics, and compliance mapping.

The Complete Comparison: Microsegmentation vs. VLAN for OT

The following table evaluates microsegmentation vs. VLAN segmentation for OT networks across twelve dimensions that matter to security architects designing industrial network defenses.

Dimension

VLAN Segmentation

Microsegmentation

Why It Matters for OT

Segmentation granularity

Segment = group of devices (typically 10–100 per VLAN)

Segment = individual device or workload

Determines whether a single compromised device exposes the entire segment

East-west traffic control

None within a VLAN – devices communicate freely

Full control – every device-to-device flow requires policy authorization

Most OT lateral movement occurs east-west within segments, not between them

Policy basis

Switch port, MAC address, or VLAN tag (Layer 2)

Identity, role, device type, posture, application, time (Layer 7)

Identity-based policies survive IP changes and follow devices across locations

Lateral movement prevention

Prevents movement between VLANs only – unrestricted within

Prevents movement between all devices – even within the same network zone

CISA 2025: VLANs alone insufficient; must enforce dynamic, context-aware controls

OT protocol awareness

No protocol inspection – filters by IP/port only

Can enforce protocol-specific policies (Modbus, EtherNet/IP, DNP3)

OT protocols lack built-in authentication – segmentation must compensate

Agent requirement

No agents required – enforced at switch level

Depends on implementation – agentless options available for legacy OT

Legacy PLCs and RTUs cannot run agents; agentless enforcement is required

Policy management at scale

ACL rule count grows exponentially with device count

Policy defined by identity attributes – scales linearly with device types

A 500-device OT network may require thousands of ACL rules but only dozens of identity policies

Impact of misconfiguration

Misconfigured ACL exposes entire VLAN to unauthorized traffic

Misconfigured policy affects only the specific device or communication path

OT misconfiguration can disrupt physical processes – blast radius matters

Compliance alignment

Meets IEC 62443 zone requirements at macro level only

Maps directly to IEC 62443 zones, conduits, and security levels per device

Auditors increasingly require per-device policy evidence, not just network diagrams

Deployment disruption

Requires switch reconfiguration, VLAN trunk changes, potential downtime

Software-defined – can deploy in monitor mode before enforcing

OT environments cannot tolerate unplanned downtime for security changes

Visibility

No visibility into intra-VLAN traffic

Full visibility into all device-to-device communication flows

Visibility is prerequisite for both security and troubleshooting in OT

Integration with identity systems

No native integration – VLAN assignment is static

Integrates with Active Directory, SAML, RADIUS for dynamic policy

Enables per-user, per-device access control tied to organizational identity

Why VLANs Alone Cannot Prevent Lateral Movement in OT

The comparison table reveals a structural limitation that no VLAN configuration can overcome: VLANs create boundaries between groups of devices, not between individual devices. Inside a VLAN, every device trusts every other device.

Consider a typical OT Level 2 VLAN containing 8 HMI panels, 4 engineering workstations, 2 historian servers, and a patch management server. An attacker who compromises one engineering workstation through a phishing email or a compromised vendor session now has unrestricted access to all 14 other devices in the VLAN – including the HMIs that control physical processes.

The attacker does not need to cross any VLAN boundary. The attacker does not need to exploit any firewall rule. The attacker simply uses standard protocols – RDP, SMB, WMI – to move laterally within the VLAN. This is exactly the pattern Dragos documented throughout 2025: ransomware affiliates authenticated into VPN portals, then used RDP and SMB to move toward SCADA systems within flat or poorly segmented OT zones.

The severity is captured in a single question that CISA’s microsegmentation guidance poses directly to OT operators: if you choose VLAN segmentation alone, are you willing to surrender all assets in that VLAN segment to a ransomware attack when one device is compromised?

A prevention-first approach to lateral movement requires controls that operate between every device – not just between groups of devices.

When to Use VLANs, When to Use Microsegmentation, When to Use Both

The choice between microsegmentation vs. VLAN segmentation for OT is not binary. In most OT environments, the practical answer involves both – VLANs for macro-level zone separation and microsegmentation for micro-level device isolation.

Decision Framework by OT Security Maturity

OT Security Maturity

Current State

Recommended Approach

Rationale

Level 1 – Flat network

No segmentation, all devices on single network

Deploy VLANs first to establish Purdue-level zone boundaries

VLANs provide immediate risk reduction from a flat baseline

Level 2 – Basic zones

VLANs separate Purdue levels, but no intra-zone controls

Add microsegmentation within critical zones (Level 2, IDMZ)

Critical OT devices need per-device isolation that VLANs cannot provide

Level 3 – Zone + conduit

VLANs with inter-zone firewall rules, IEC 62443 zone mapping

Deploy microsegmentation across all OT zones, keep VLANs for macro structure

Full east-west control, identity-based policies, compliance evidence per device

Level 4 – Zero Trust OT

Microsegmentation with identity-based policies, continuous verification

Extend microsegmentation to IT/OT convergence points and vendor access paths

Complete lateral movement prevention across the entire IT/OT boundary

What to Segment First

For organizations adding microsegmentation to an existing VLAN architecture, prioritize in this order:

  1. IDMZ (Purdue Level 3.5) – the historian relay, patch server, access gateway, and any other service that bridges IT and OT should each be isolated in its own microsegment. This is where 75% of IT-to-OT attacks cross the boundary.

  2. Engineering workstations (Level 3) – these are the highest-value targets in OT because they have both network access to control systems and standard IT capabilities (email, web browsing, file sharing) that make them vulnerable to IT-based attacks.

  3. HMI panels (Level 2) – operator stations that control physical processes should be isolated so that a compromised HMI cannot reach other HMIs or PLCs outside its defined communication path.

  4. Safety Instrumented Systems (Level 1) – SIS must be segmented from process control systems so that a compromise of the DCS cannot reach the safety system.

Organizations that adopt a three-layer approach to IT-to-OT connectivity address not only east-west segmentation but also north-south access control and secure file transfer between zones – the three dimensions that together provide complete OT boundary protection.

How to Implement Microsegmentation in OT Without Disrupting Production

The primary operational concern in OT microsegmentation deployment is production disruption. A misconfigured policy that blocks legitimate communication between a PLC and its HMI can halt a physical process. This concern is valid – and it is the reason why microsegmentation platforms designed for OT provide a phased deployment model with monitor-before-enforce capability.

Phase 1: Discover and Map Communication Flows (2–4 weeks)

Deploy the microsegmentation platform in observation mode. The platform passively discovers all device-to-device communication flows in the OT network – which devices communicate with which, on which ports and protocols, at what frequency, and at what volume.

This discovery phase produces a communication flow map that most OT organizations have never had. It reveals communications that should not exist (an engineering workstation communicating directly with the internet), communications that are critical but undocumented (a historian server pulling data from 40 PLCs), and redundant paths that could be eliminated.

Phase 2: Design Least-Privilege Policies (1–2 weeks)

Using the discovered communication flows, define policies that allow only the observed legitimate communications and deny everything else. Policies are defined by identity attributes – device type, function, Purdue level, user role – not by IP address.

Phase 3: Validate in Simulation Mode (2–4 weeks)

Apply policies in simulation mode (also called monitor mode or alert-only mode). The platform evaluates every communication against the proposed policies and logs what would be allowed and what would be blocked – without actually blocking anything.

Review the simulation logs for false positives – legitimate communications that the proposed policies would incorrectly block. Adjust policies before enforcement.

Phase 4: Enforce in Waves (2–4 weeks)

Enable enforcement incrementally – starting with the IDMZ, then engineering workstations, then HMI panels, then PLCs. Each wave is monitored for operational impact. If a policy blocks a legitimate communication, it can be adjusted in real time without network reconfiguration.

Phase 5: Integrate and Operationalize (ongoing)

Connect microsegmentation policy logs to the enterprise SIEM. Define processes for policy updates when new OT devices are added, when vendor access paths change, or when maintenance activities require temporary policy exceptions.

How TerraZone’s Microsegmentation Platform Addresses OT Requirements

TerraZone’s truePass platform provides microsegmentation for OT environments through an architecture specifically designed for industrial network constraints.

The platform enforces identity-based segmentation that ties access policies to device identity, user identity, and operational context – not to IP addresses or VLAN membership. Each endpoint operates in its own security zone. Communication between zones requires explicit policy authorization based on verified identity.

Key capabilities that address OT-specific requirements:

Identity-Based Firewall (IDFW) embeds firewall enforcement directly at the endpoint level. Only authenticated and authorized users can access specific OT systems. Even if credentials are stolen, the compromised identity cannot reach systems outside its authorized communication paths.

Per-endpoint isolation treats each device as its own security zone. A compromised HMI is contained – the attacker cannot pivot to other HMIs, engineering workstations, or PLCs in the same zone.

Device posture verification evaluates security posture (OS version, patch status, firewall status, running processes, geolocation) before granting access. Non-compliant devices are blocked from connecting to critical OT systems.

Agentless enforcement options address legacy OT devices that cannot run agents. Policy enforcement occurs at the network level without requiring software on PLCs, RTUs, or legacy HMIs.

Syslog and SIEM integration exports all segmentation events to enterprise SIEM platforms, providing the unified visibility across IT and OT that compliance auditors require.

For organizations ready to move beyond traditional network segmentation, TerraZone’s next-generation microsegmentation provides dynamic policy enforcement that adapts to workload changes, follows devices across network locations, and enforces Zero Trust principles at every communication path.

Compliance Mapping: VLAN vs. Microsegmentation Against OT Standards

Standard

VLAN Segmentation Compliance

Microsegmentation Compliance

IEC 62443 – Zones and Conduits

Partially meets FR5 (Restricted Data Flow) at zone level

Fully meets FR1-FR7 with per-device policy enforcement per zone and conduit

NIST SP 800-82 Rev 3

Meets basic segmentation recommendation

Meets advanced recommendation for identity-based access control per OT asset

NIST SP 800-207 (Zero Trust)

Does not align – VLANs are location-based, not identity-based

Directly aligned – policies based on identity, device, and context per request

NERC CIP-005-7

Meets Electronic Security Perimeter definition at zone boundary

Exceeds requirements with per-device perimeters and continuous access verification

TSA Security Directive

Meets basic segmentation requirement

Meets advanced requirement for dynamic, context-aware segmentation

CISA ZTMM

Scores at Traditional/Initial maturity levels

Scores at Advanced/Optimal maturity levels

Frequently Asked Questions

What is the main difference between microsegmentation and VLAN segmentation in OT?

VLAN segmentation creates boundaries between groups of devices. Microsegmentation creates boundaries around each individual device. In an OT environment, this distinction determines whether a single compromised device exposes 10–100 other devices in the same VLAN or is contained as an isolated incident. VLANs prevent movement between zones. Microsegmentation prevents movement everywhere.

Can microsegmentation replace VLANs in OT networks?

Microsegmentation does not require removing existing VLANs. In practice, most OT environments benefit from a layered approach: VLANs provide macro-level zone separation aligned with the Purdue Model, and microsegmentation provides micro-level device isolation within those zones. The VLANs remain as the structural foundation. Microsegmentation adds the per-device access control that VLANs cannot provide.

Does microsegmentation require agents on OT devices?

Not necessarily. Modern microsegmentation platforms offer agentless enforcement options for legacy OT devices (PLCs, RTUs, legacy HMIs) that cannot support agent installation. Agent-based enforcement provides deeper visibility on devices that can support it (engineering workstations, historian servers, modern HMIs). The optimal deployment uses agents where possible and agentless enforcement where necessary.

How long does microsegmentation deployment take in OT environments?

A phased deployment – discovery, policy design, simulation, staged enforcement – typically takes 8 to 14 weeks for an OT environment with 200–500 devices. The discovery and simulation phases run passively with zero production impact. Enforcement is applied incrementally, starting with the highest-risk zones.

What is the cost difference between VLAN and microsegmentation for OT?

VLAN segmentation has lower initial cost – it requires only managed switches and router/firewall configuration. However, ACL management costs grow significantly as device counts increase (rule sets become exponentially complex). One industrial manufacturer reported avoiding $18.5 million in network infrastructure upgrades across 53 facilities by implementing software-defined microsegmentation instead of expanding the VLAN-based architecture. The total cost of ownership comparison favors microsegmentation for environments with more than approximately 100 OT devices.

Which compliance standards require microsegmentation vs. VLAN for OT?

No standard explicitly mandates microsegmentation by name. However, CISA’s 2025 guidance explicitly states that VLANs alone are insufficient and that segmentation must be dynamic and context-aware. IEC 62443 requires access control at the zone and conduit level – which microsegmentation addresses more completely than VLANs. NIST SP 800-207 requires identity-based access control – which VLANs cannot provide. Organizations targeting CISA ZTMM Advanced or Optimal maturity levels require microsegmentation.

Conclusion

The comparison between microsegmentation vs. VLAN segmentation for OT networks comes down to a single architectural question: does your segmentation prevent lateral movement between every device, or only between groups of devices?

VLANs provide valuable macro-level zone separation. They reduce broadcast domains, align with the Purdue Model, and require no endpoint agents. For organizations moving from flat networks to any level of segmentation, VLANs are the correct first step.

But VLANs cannot control east-west traffic within a zone. They cannot enforce identity-based access policies. They cannot isolate a compromised HMI from the 30 other devices in the same VLAN. When Dragos reports that ransomware affiliates use RDP and SMB to move laterally within OT zones, VLANs offer no defense against that movement.

Microsegmentation closes this gap by creating per-device security zones with identity-based policies. Research confirms a 95.8% reduction in lateral movement when microsegmentation is combined with Zero Trust principles. For OT environments where lateral movement translates to physical operational disruption, that difference is the difference between a contained security incident and a production shutdown.

The practical path forward is layered: VLANs for macro structure, microsegmentation for micro enforcement. Start with the IDMZ and engineering workstations, validate in simulation mode, enforce in waves, and extend to all OT zones. The segmentation technology exists. The implementation methodology is proven. The attacker’s playbook has not changed – lateral movement remains the critical enabler. The segmentation architecture that stops lateral movement everywhere, not just at zone boundaries, is the architecture that protects OT.

 

Welcome! Let's start the journey

AI Personal Consultant

Chat: AI Chat is not available - token for access to the API for text generation is not specified