IEC 62443 does not define a single fixed way to connect OT to the cloud. It treats cloud services as another networked component or external zone that must be risk-assessed, segmented, and controlled like any other untrusted or semi-trusted environment.
How IEC 62443 views cloud in an OT context
In IEC 62443 terms, a cloud service is typically modeled as:
- An external zone (often untrusted or low-trust), or
- A separate security zone with its own security level target and requirements.
The cloud is therefore not “special” in the standard; it is another network environment that participates in a zone-based architecture. The same principles used for enterprise IT connections into OT apply to cloud, often with stricter controls because you usually do not control the underlying infrastructure.
Relevant IEC 62443 parts for cloud-connected OT
IEC 62443 addresses cloud-related concerns indirectly across several parts:
- IEC 62443-1-1 / 1-2: Terminology and models, including zones, conduits, and security levels. You represent the cloud as a zone and define conduits between OT and cloud.
- IEC 62443-2-1 / 2-4: Security program and service provider requirements. These are key for governing third-party cloud providers, managed services, and shared responsibilities.
- IEC 62443-3-2: Risk assessment and system design. You identify cloud data flows, apply threat modeling, and assign security levels and countermeasures.
- IEC 62443-3-3: System security requirements. Many foundational requirements (FR) explicitly affect cloud connectivity, such as access control, use control, data confidentiality, data integrity, restricted data flow, and resource availability.
- IEC 62443-4-1 / 4-2: Secure product development and component requirements. These influence gateways, edge devices, and applications that communicate with the cloud.
None of these parts define a specific vendor cloud or architecture. Instead, they give requirements that must be implemented in whatever cloud/OT design you deploy.
Typical IEC 62443-aligned patterns for OT–cloud connections
In regulated, brownfield environments, the following patterns are commonly derived from IEC 62443 principles:
- Edge or DMZ mediation: OT assets do not talk directly to the internet or cloud. Data flows through an industrial DMZ or edge node in a separate security zone, which enforces protocol break, inspection, and authentication.
- Unidirectional or constrained flows: Where possible, data flows from OT to cloud (telemetry, historian replication) with no inbound control path. If bidirectional control is required, this is tightly scoped, authenticated, and justified via risk assessment.
- Granular zones and conduits: OT networks, DMZ, corporate IT, and cloud endpoints are each distinct zones. Conduits between zones enforce encryption, authentication, filtering, and monitoring according to defined security level targets.
- Service provider governance: Cloud provider responsibilities are mapped against IEC 62443-2-4 / 4-2 capabilities where possible. Gaps (e.g., logging granularity, key management, data residency) are addressed with additional controls or compensating measures.
Key requirement themes when involving the cloud
From IEC 62443-3-3 and related parts, several requirement families are particularly relevant for OT–cloud designs:
- Access control and identification (FR 1, FR 2): Unique identities for devices, services, and users accessing OT data via the cloud. Strong authentication, role-based access, and least privilege for remote access and APIs. Shared accounts and unmanaged tokens are inconsistent with higher security levels.
- Data confidentiality and integrity (FR 3, FR 4): Encrypted channels between OT edge and cloud (e.g., TLS with managed certificates), integrity checks, and protection against replay or spoofing. In long-lifecycle OT, certificate renewal and crypto agility must be considered upfront.
- Restricted data flow (FR 5): Explicit allowlists for destinations and ports; no general internet egress from OT. Cloud endpoints are treated as a small, well-defined set of addresses or FQDNs. Proxies or brokers in a DMZ enforce policy.
- Timely response to events (FR 6): Centralized logging and alerting that includes OT edge and cloud access events. Practical logging must account for bandwidth limits and data retention rules in regulated industries.
- Resource availability (FR 7): OT should continue to operate safely on network or cloud loss. Cloud should be designed as an enhancement (analytics, optimization), not a dependency for local safety or core control functions.
Brownfield and regulated-environment realities
Implementing IEC 62443-aligned cloud connectivity in existing plants is constrained by legacy equipment, integration debt, and qualification requirements:
- Legacy protocols and assets: Many controllers and tools cannot support modern security natively. An IEC 62443-compliant approach often uses gateways or protocol converters in a separate zone, leaving the legacy device isolated while hardening the conduit.
- Validation and change control: Introducing cloud data flows, even if only for monitoring, usually triggers change control, revalidation, and extensive documentation. IEC 62443 does not reduce that burden; it shapes how you justify and document the changes.
- Limited downtime and phased deployment: Full replacement of legacy control systems to make them “cloud ready” is rarely realistic. A more typical path is incremental: add a secure edge, then selectively enable low-risk data flows, then expand once monitoring and controls are proven.
- Traceability requirements: You must be able to trace what data left the OT environment, who had access, and how it might influence decisions. IEC 62443 principles help structure this, but the actual traceability depends on logging and integration quality across OT, IT, and cloud.
What IEC 62443 does not do for cloud OT connections
It is important to be explicit about the limits of the standard:
- No architecture guarantee: IEC 62443 does not say that any specific cloud architecture is “compliant” or safe by default. Two systems can claim IEC 62443 alignment and still have very different real-world risk profiles.
- No automatic vendor compliance: A cloud provider marketing IEC 62443 awareness does not mean your overall OT–cloud system meets a target security level. System integration, configuration, and ongoing operations remain your responsibility.
- No bypass of regulatory or safety requirements: Using IEC 62443-aligned patterns does not remove obligations around validation, safety analyses, data residency, export controls, or audit expectations.
Practical implications for OT leaders
When applying IEC 62443 to cloud-connected OT environments:
- Treat the cloud as a distinct zone with clearly defined trust level, not a seamless extension of OT.
- Use IEC 62443-3-2 to formally assess risks and justify each OT–cloud data flow.
- Design for loss of cloud connectivity without loss of safe local operation.
- Plan lifecycle governance: certificate rotation, key management, logging, incident response, and periodic re-assessment as cloud services change.
IEC 62443 provides the framework and requirements to structure these decisions, but the security and suitability of a cloud connection to OT will always depend on your specific architecture, vendor stack, and the rigor of your implementation and operations.