A zone and conduit diagram is a high-level cybersecurity and network model showing logical security zones and the conduits that connect them.
A zone and conduit diagram is a high-level representation of how systems and networks are segmented into security zones and how those zones are interconnected by conduits. It is commonly used in industrial control system (ICS) and operational technology (OT) environments to describe cybersecurity architecture and trust boundaries.
The diagram groups assets (such as PLCs, HMIs, servers, historian, MES, ERP interfaces, and remote access components) into zones that share similar security requirements and risk profiles. It then shows conduits, which are the controlled pathways that allow data or control signals to move between zones. Conduits usually correspond to network segments, firewalls, VPNs, serial links, or other communication channels that can be governed by access control and monitoring rules.
In industrial and regulated manufacturing environments, a zone and conduit diagram commonly includes:
The diagram is usually at a logical or logical-physical level. It is more detailed than a simple block diagram of the plant, but less detailed than a full network topology that lists every device and cable.
Zone and conduit diagrams are commonly used to support:
In regulated plants, zone and conduit diagrams are often maintained under document control and formal change management so they remain aligned with the actual implemented architecture.
A zone and conduit diagram is related to but distinct from:
Zone and conduit concepts are commonly associated with industrial cybersecurity frameworks for control systems. These frameworks describe how to partition systems into zones with similar security needs and to manage the conduits between them. The diagram is the practical documentation of that partitioning, supporting consistent implementation, review, and assessment across OT and IT environments.
In brownfield and regulated manufacturing sites, zone and conduit diagrams are typically detailed enough to show boundaries, trust levels, critical assets, protocols, and ownership, but not every cable or device. The emphasis is on accuracy, clarity, and maintainability so the diagrams can reliably support risk analysis, access control decisions, and change impact assessments over time.