PracticeBlogFlashcardsEspañol

Segmentation for Guest, BYOD, IoT, IIoT, SCADA, ICS, and OT

Key Takeaways

  • Segmentation limits which systems can communicate and reduces the impact of compromise or misconfiguration.
  • Guest, BYOD, IoT, and OT devices usually need different trust levels and different network policies.
  • VLANs, ACLs, firewalls, NAC, SSIDs, VRFs, and microsegmentation can all support segmentation.
  • SCADA, ICS, and OT environments prioritize safety, availability, vendor support, and controlled change.
  • A good segmentation design permits required flows and denies unnecessary east-west movement.
Last updated: April 2026

Segmentation for Mixed Device Environments

Segmentation separates networks by trust level, function, risk, ownership, or compliance need. It does not have to mean a completely separate physical network. Segmentation can be built with VLANs, subnets, ACLs, firewalls, VRFs, SSIDs, software-defined networking, network access control, and host-based controls.

The goal is controlled communication. Devices should reach what they need and nothing else.

Device Groups and Trust

Device groupCommon riskSegmentation goal
Guest devicesUnknown ownership and security postureInternet access only; no internal routing
BYODPersonal devices with limited managementRestricted access to approved services
IoTWeak patching, embedded credentials, cloud dependenciesPermit only required DNS, NTP, controller, or vendor flows
IIoTIndustrial sensors and smart manufacturing devicesSeparate from enterprise users and control access tightly
SCADA and ICSOperational safety and uptime impactProtect control networks from enterprise and Internet exposure
OTPhysical process control and monitoringPrioritize availability, safety, and controlled maintenance

Guest Wi-Fi should not share the same security posture as corporate laptops. A thermostat, camera, badge reader, or printer should not be able to initiate connections to payroll servers. A programmable logic controller should not browse the Internet or receive traffic from general office workstations unless there is a specific approved need.

Segmentation Controls

ControlWhat it contributes
VLAN and subnet designLogical separation and clear routing boundaries
ACLsStateless or simple filtering at routers, switches, and interfaces
FirewallsStateful policy, logging, inspection, and zone enforcement
NAC and 802.1XPlaces devices into the correct network based on identity or posture
Separate SSIDsMaps wireless users or devices to different VLANs and policies
VRFSeparates routing tables for stronger network-level isolation
MicrosegmentationNarrows east-west communication between workloads or hosts

Segmentation should be documented as allowed flows. A diagram that says "IoT VLAN is isolated" is less useful than a policy table that shows IoT devices can reach DNS, NTP, the IoT controller, and one vendor update endpoint, while all other internal destinations are denied.

OT and ICS Design Cautions

Operational technology includes systems that monitor or control physical processes. ICS and SCADA environments may include sensors, PLCs, HMIs, historians, engineering workstations, and vendor remote support. These environments can have long hardware lifecycles and strict uptime requirements.

RequirementDesign implication
SafetyAvoid changes that could disrupt physical processes
AvailabilitySchedule maintenance and test failover carefully
Legacy protocolsCompensate with isolation and monitoring when encryption is unavailable
Vendor accessUse approved remote access paths with MFA, time limits, and logging
Data sharingUse a controlled path such as a historian or broker instead of direct enterprise access

Example Segmentation Matrix

SourceAllowed destinationDenied destination
Guest Wi-FiInternet via firewallCorporate LAN, server VLANs, management VLAN
BYODSSO portal, VDI, selected SaaSDirect database and file server access
Camera VLANVideo recorder, DNS, NTPWorkstations, finance systems, domain controllers
Engineering workstationOT jump host and approved controllersGeneral Internet browsing from OT zone
Corporate usersHistorian read portalDirect PLC or controller access

Common Traps

  • A VLAN alone does not enforce security if routing and ACLs allow everything between VLANs.
  • Guest networks need client isolation and internal deny rules, not only a different SSID name.
  • IoT devices often need outbound cloud access, but they rarely need broad internal access.
  • OT remote access should be explicit, logged, time-bounded, and approved.
  • Segmentation should be tested from the source network, not only reviewed on paper.
Test Your Knowledge

A guest wireless network can reach internal file servers because inter-VLAN routing allows all traffic. What is the primary design problem?

A
B
C
D
Test Your Knowledge

Which design is most appropriate for vendor support of an OT controller?

A
B
C
D
Test Your KnowledgeMulti-Select

Which controls can support network segmentation? Select three.

Select all that apply

VLANs with appropriate routing policy
Firewall rules between zones
NAC assigning devices to networks based on identity or posture
One flat subnet for all devices
Allow-any ACLs between every VLAN