
By Xavier Mesrobian
How can you implement Industrial AI and also keep your customer’s OT data secure? The optimal approach, mandated by the NIS2 Directive and NIST CSF 2.0, is complete network segmentation.
The OT system should be fully isolated from the Internet and any cloud system. This is best done using a DMZ (demilitarized zone), keeping the production network behind closed firewalls. The question is, how?
Protocol Challenges
Moving production data to a cloud-based AI system in real time through a DMZ requires two steps, plant-to-DMZ and DMZ-to-cloud.
However, the two most popular industrial protocols, OPC UA and MQTT, were not designed for this.
The OPC UA protocol is too complex to reproduce well in a daisy chain across multiple servers. Information will be lost in the first hop. The synchronous multi-hop interactions needed to pass data across a DMZ would be fragile on all but the most reliable networks and would result in high latencies.
MQTT can be daisy-chained, but it requires each node in the chain to be individually configured and aware that it is part of the chain. The QoS (Quality of Service) guarantees in MQTT cannot propagate through the chain, making data at the ends of the chain unreliable.
Therefore, MQTT is best used as the last step only, to move data from the DMZ to the cloud.
The problem remains, how to move data securely from the plant to the DMZ? OPC UA would require opening a firewall on the production network, which is too high a risk. Most security administrators will simply not allow it.
Tunnel/Mirroring
Since neither OPC UA nor MQTT alone, or together, are sufficient for passing data through a DMZ, another approach is needed — one that integrates well with both of these protocols.
Secure tunnel/mirroring software provides a solution. It can make the connections at both ends and pass the data along the daisy-chained connections through a DMZ.

The tunnel/mirror software connects to MQTT, OPC UA, or other industrial protocol at the production facility and mirrors the full data set to a similar component on the DMZ.
Ideally, both components should be able to maintain the data in a unified namespace. This way the data can be converted to MQTT for sending to the AI cloud service from the DMZ.
The mirroring capability of the tunnel/mirror software keeps that data consistent between the original data source, the DMZ, and the AI system.
Firewalls and Data Diodes
Since all inbound firewall ports on the production system must be kept closed, the tunnel/mirror system must be able to make outbound-only connections to the DMZ.
Also, some mission-critical applications require a hardware data diode to ensure that not a single data packet gets back to the industrial network. The tunnel/mirror system would need to provide data diode support for that level of secure architecture.
Other AI implementations may call for bidirectional data flow. The tunnel/ mirror technology should be flexible enough to support that, if needed.
In any case, there should be no access to data beyond what the AI system uses. Plant engineering staff must have full control over which data will be made available.
Many companies today are looking at industrial AI to optimize production.
But they need secure access to production data. This is difficult, but not impossible.
You can protect an OT network with a DMZ and still feed data to AI systems, using secure tunnel/mirroring.
Cogent DataHub software from Skkynet provides an off-the-shelf tunnel/mirror solution that is DMZ and data diode compatible and keeps all inbound firewall ports closed.
Xavier Mesrobian is on the board of directors at Skkynet Cloud Systems.
This content is sponsored by Skkynet.
*Featured Image courtesy of Skkynet