Get a Demo

    What Is a DMZ? Network Security Fundamentals and Zero Trust Evolution

    The Evolution of DMZ Security: A Zero Trust Guide for OT and Industrial Networks

    zentera-hero-bg
    For decades, the use of a demilitarized zone (DMZ) has been central to network security.


    Established between trusted, internal network assets and those designed to serve untrusted external users, the DMZ is essentially a buffer between the two areas, filtering traffic, enforcing security policies, and reducing the chance of an intruder reaching critical services. 

    However, as threats continue to evolve and network architectures become more complex, many IT security professionals are beginning to say that the DMZ is obsolete. Enhancements such as cloud environments, identity-centric security tools, and compliance regulations are reshaping modern IT environments. In response, security models like Zero Trust have stepped up to provide organizations with the agility and protection they need. 

    Yet, for operational technology (OT), industrial control systems (ICS), and other critical infrastructure environments, the use of a DMZ is still common. In fact, for organizations whose systems are comprised of legacy hardware, DMZs are more important than ever. 

    The key is in how DMZs are deployed. DMZs enabled through firewalls are no longer able to provide adequate protection, especially where modern technologies and legacy systems meet. That’s where security models like Zero Trust DMZs shine.

    This guide explains how a Zero Trust DMZ works, how it differs from traditional DMZ network security, and how organizations can implement it in a scalable and operationally safe way.

    DMZ Fundamentals: What You Need to Know

    Hands typing on a laptop with overlaid code and binary numbers.
    What Is a DMZ? A DMZ is a segmented network created to sit between two network zones or boundaries, usually between an internal network and external-facing devices capable of accessing the internet. Devices that sit within a DMZ need to be accessible from less-trusted devices or networks, helping prevent direct access to more sensitive internal digital assets.

    A DMZ typically:

    • Enables the filtering of inbound and outbound traffic
    • Enforces security policies
    • Performs basic network traffic inspection and scanning
    • Isolates services accessible from less-trusted devices
    • Limits lateral movement during breaches
    • Supports regulatory requirements for segmentation

    For example, web servers, email gateways, and VPN concentrators are usually hosted inside DMZs.

    DMZs as a Security Mechanism

    For decades, DMZs have been a foundational element of network security. The DMZ introduced one of the earliest and most effective forms of network segmentation, helping limit attack surfaces long before Zero Trust became a leading security model.

    Put another way, a DMZ creates a security buffer zone or controlled area where access can be tightly regulated and monitored. In OT environments, where full cloud migration and endpoint modernization are often impossible or prohibitively expensive, DMZs can be indispensable.

    Related Resources

    The DMZ Evolution Challenge

    Two people focused on a computer screen in an office setting.
    Is the DMZ Dead? There will always be a place for the use of DMZs and perimeter-based security. The frequency, reliance, and scale, however, have diminished in many modern IT environments with the rise of identity-aware proxies, cloud-native security controls, and Zero Trust Network Access (ZTNA) models. 

    Why Traditional DMZs Fail in OT

    Traditional DMZ network security relies almost entirely on firewalls that filter traffic at layers 3 and 4 of the OSI Model. This creates several critical limitations in OT environments, which operate in fundamentally different ways and with requirements that prevent traditional DMZs from being effective.

    • Operational continuity: Downtime for configuration changes, patching, or troubleshooting is often unacceptable. Even brief interruptions can cause costly production delays or disrupt critical services.
    • Legacy systems: Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and Human–Machine Interfaces (HMIs) may be decades old, lack vendor support, and cannot be upgraded to support modern security controls.
    • Real-time requirements: Millisecond latency caused by firewall-based introspection can be enough to negatively impact safety and reliability. 
    • Brownfield constraints: Rip-and-replace upgrades to accommodate modern firewalls are rarely feasible or cost-effective, forcing security solutions to work around existing architectures and physical infrastructure.
    • Safety implications: Cybersecurity failures in OT environments can have effects that extend beyond data loss, including equipment damage, environmental impact, or physical harm to personnel or customers.

    These potential consequences demand a different approach—one that preserves the DMZ concept while adjusting its mechanism to match OT realities with cutting-edge security tools.

    Zero Trust DMZ: The Evolution of OT Security

    A person in glasses working on computer screens displaying code in a dimly lit room
    A Zero Trust DMZ does not eliminate the DMZ; it takes it to the next level. The fundamental element of a DMZ—segmentation between trusted and untrusted networks—remains valid. However, enforcement shifts from static network rules to inline, packet-level decisions where each session is continuously validated with identity- and policy-driven controls, not just firewalls, proxies, gateways, or other network-level devices.

    In an OT environment, this identity enforcement via a Zero Trust DMZ will not require tools like PLCs, RTUs, and other legacy devices to have identity management capabilities. Instead, identity will be assigned to the traffic itself at the packet and session level. This allows for the original OT assets to remain unchanged and become operationally safe. 

    A Zero Trust DMZ achieves this by applying Zero Trust principles directly to the DMZ architecture, providing:

    • Continuous authentication: Every access attempt is verified without interruption.
    • Authorization enforcement: Policies evaluate who, what, when, where, and why users or systems are accessing other digital resources.
    • Least privilege access: Permissions are user roles as well as task- and time-bound.
    • Breach assumption: The architecture limits blast radius by assuming a threat is already in the network, “locking down” access except for validated connections.
    • Microsegmentation: Isolated zones exist even within the DMZ itself, enforced at the packet level. This allows for identity to be confirmed within the traffic path and segmentation decisions are made per session. This occurs without relying on a control-plane overlay or label-based system at the IP level.

     

    Resource: Learn more about these principles in Zentera’s resource, What Is Zero Trust Security and Why It Matters.

     

    Traditional DMZ vs. Zero Trust DMZ 

    Element

    Traditional DMZ

    Zero Trust DMZ

    Enforcement Layer

    Network (L3/L4)

    Inline packet-level enforcement bound to identity and policy

    Policy Structure

    Static rules

    Dynamic, policy-driven

    Access Control Determination

    IP/Port-based

    Identity-based

    Context Awareness

    None

    User, device, time, location

    Monitoring Capability

    Perimeter only

    Continuous user/system validation

    1 Enforcement occurs directly in the network traffic path and does not rely on network tunneling or gateway redirection.

    Related Resources

    OT-Specific DMZ Implementation Considerations

    A digital shield with a padlock, symbolizing security, surrounded by tech icons and held by a hand.
    Industrial DMZ (IDMZ) Architecture In industrial environments, the DMZ is often referred to as an industrial DMZ (IDMZ). The IDMZ typically sits between enterprise IT networks and OT networks, which the Purdue Model (Levels 0-5) defines with Level 3 as Operations Control and Level 4 as Enterprise IT. 

    This means that the Zero Trust DMZ must support both traditional network protocols and industrial protocols, such as:

    • Modbus
    • DNP3
    • OPC/OPC UA
    • BACnet
    • PROFINET

    Legacy and Brownfield Challenges

    In addition to the need to balance both OT and IT protocols, a Zero Trust DMZ must also account for the following requirements common in legacy systems:

    • Hardware or software that cannot run agents
    • Devices that cannot be patched
    • Zero tolerance for outages

    This means the IT team must be able to deploy a Zero Trust DMZ solution that requires no changes to existing devices, deploys inline without network reconfiguration, supports a phased rollout to prevent downtime, and operates alongside existing security tools.

    Securing IT-OT Convergence

    Three people in an office, collaborating at a computer workstation.
    For security teams, the network zones where traditional IT systems and OT networks meet are fraught with security challenges. Not only do security mechanisms need to be nimble to allow operational traffic, but they also need to balance the requirements of both legacy and modern systems. At the same time, they must be stable, safe to deploy, and capable of configuration without causing downtime.

    In this zone, traditional IT security tools often fail because:

    • Scanning can crash sensitive devices
    • Legacy systems do not meet the implementation requirements
    • Patch cycles disrupt operations

    Zero Trust DMZ as the Bridge

    A Zero Trust DMZ enables safe IT-OT convergence by:

    • Mediating access between IT users and OT assets at the network level, not hardware
    • Enforcing environment-specific policies, regardless of device type
    • Providing visibility to security teams without disruption

    Zero Trust DMZ vs. OT Firewalls

    Person using a laptop with virtual interface overlays showing a numeric keypad and login fields.
    Given their complexity—both due to network configuration and hardware deployment—OT environments can be difficult to secure with firewalls alone. Although there is a place for firewalls, these devices rely on static rules and are difficult to scale across legacy systems, distributed sites, and variable access needs. Often, the result of exclusively using OT firewalls is a brittle network architecture that is easy to misconfigure and difficult to manage and protect.

    Comparing OT Firewalls with Zero Trust DMZs

    Capability

    OT Firewall

    Zero Trust DMZ

    Continuous Authentication and Authorization 

    Identity-Based Policy Enforcement

    Centralized Management

    Limited

    Microsegmentation

    Requires configuration

    Built-in

    OT Protocol Support

    Limited

    Comprehensive

    Scalability

    One firewall per segment

    Multiple segments per device

     

    What a Zero Trust DMZ is Not

    A Zero Trust DMZ does not rely on tunneling traffic through proxies, use identity and access management applications and firewalls to validate traffic, or enforce segmentation only via control-plane overlays. Similarly, a Zero Trust DMZ does not just evaluate traffic before it enters the DMZ or after it exits like a traditional firewall.

    How Zentera Implements a Zero Trust DMZ for OT

    Two people collaborating at a desk with computers in an office
    Zentera delivers a Zero Trust DMZ through its Zero Trust Gatekeeper (ZTG) solution and CoIP® Platform, which are purpose-built for OT and industrial environments. Instead of relying on static firewall rules or network redesign, Zentera’s solutions enforce identity-based access controls that offer:
    • Inline, Non-Disruptive Deployment

    ZTG is deployed directly in front of protected resources or subnets. This allows for inline inspection and enforcement at the packet level, binding identity to live traffic flows without proxying sessions, terminating connections, or introducing gateway bottlenecks. This approach also allows organizations to introduce Zero Trust without downtime or operational disruption.

     

    • Scalable Virtual Segmentation

    Through virtual segmentation, a single ZTG can protect up to 32 port pairs, creating multiple isolated security zones with one device. Combined with centralized policy management through zCenter CoIP Controller, security teams can enjoy consistent policy enforcement, visibility, and auditing across distributed OT environments.

     

    • Simple Brownfield Deployments

    Zentera’s solution is designed specifically for brownfield deployments, providing fully agentless protection and not requiring changes to legacy PLCs, RTUs, or SCADA systems. 

    Real-World Zero Trust DMZ Use Cases

    A digital illustration of a fast-moving data stream with blue and red lines and symbols.
    Zentera’s Zero Trust DMZ can be deployed across a range of operational environments, providing benefits such as:
    • Secure Third-Party and Vendor Access

    A Zero Trust DMZ delivers identity-verified, least-privilege access for contractors and vendors, ensuring limited, time-bound, and auditable connectivity and eliminating the need for VPNs.

    • Remote Access for Engineers

    Engineers working remotely can securely access SCADA and control systems using multi-factor authentication without exposing the OT network to external threats, even when legacy systems do not support modern authentication.

    • Controlled IT-OT Data Exchange

    Operational data can be shared between IT systems through narrowly defined controlled access paths, allowing for analytics while maintaining segmentation between IT and OT networks.

    • Incident Response and Containment

    In the event of a security incident, a Zero Trust DMZ allows for instant isolation of affected segments without shutting down operations. 

    Compliance and Best Practices

    A person in a suit touching a digital screen with a security shield and padlock graphic
    A Zero Trust DMZ supports compliance with OT-specific regulations and security frameworks by enforcing network segmentation using continuous user and access controls and by providing visibility into system access. 

    This type of DMZ also helps organizations meet NERC CIP requirements, including CIP-005 for electronic security perimeters and CIP-007 for system security management, and align with IEC 62443 zone and conduit models that require defense in depth. 

    Zero Trust DMZ architectures also support compliance with the NIST Cybersecurity Framework by reinforcing the “Identify, Protect, and Detect” security functions across both IT and OT environments.

    Zero Trust DMZ Implementation Best Practices

    Successful Zero Trust DMZ deployments start by securing the highest-risk access points and critical assets first. Organizations should map existing access patterns before enforcing new policies, validate controls in monitoring mode before blocking traffic, and involve OT operations teams early in the design process. Maintaining clearly defined emergency override procedures is also essential to ensure safety and operational continuity.

    The Future of DMZ Security Is Zero Trust

    Two professionals examining a tablet in a high-tech control room filled with screens displaying data.
    As with every element of IT and cybersecurity, technologies are always evolving to stay ahead of the latest threats. The same applies to the concept of the DMZ.

    DMZs are not obsolete; they are evolving to meet the unique needs of OT and industrial environments. Solutions like Zentera’s Zero Trust DMZ represent that evolution and introduce the safest, most scalable way forward for security teams working in these specialized environments.

     

    By providing a proven way to introduce segmentation with continuous identity verification and in-line, packet-level enforcement deeper than at the firewall or proxy level, Zentera’s Zero Trust DMZ gives organizations the ability to secure critical infrastructure without compromising uptime, safety, or compatibility with legacy systems. 

    Zero Trust DMZ FAQ

    Take the Next Step

    Ready to see how a Zero Trust DMZ can secure your OT and industrial environments without disrupting operations?

    Get a Personalized Demo