- Critical OT & Industry 4.0
- Microsoft WSUS
Case Study: Secure Offline Patching for Air-Gapped OT Networks
Gas Distribution Operator in Europe
Preventing file corruption during large patch package transfers
Limited bandwidth preventing full system backup transfers
Meeting strict regulatory requirements including NIS2 and French LPM frameworks
Need / Problem / Context
Automating Secure Patching for Air-Gapped OT Infrastructure
A regional gas distribution operator in Europe needed to ensure regular operating system and application updates across a critical OT network controlling gas distribution infrastructure.
For cybersecurity reasons, the OT environment was fully air-gapped and disconnected from the Internet. While this architecture protected operational systems from remote cyber threats, it also made patch management — including WSUS (Windows Server Update Services) synchronization — extremely complex. Updates had to be transferred manually between IT and OT environments, creating operational overhead and increasing the risk of human error or data corruption.
The organization therefore needed a secure and automated mechanism to transfer validated update packages — including WSUS update flows — from the IT environment to the isolated OT network, while preserving strict one-way security separation and maintaining compliance with European critical infrastructure cybersecurity regulations (under NIS2).
Solution Deployed
A Cyberium unidirectional gateway architecture was deployed to securely transfer validated update packages from the IT patch management infrastructure to the isolated OT network while preserving strict air-gap protection. The architecture enables automated patch distribution to OT systems without introducing any inbound connectivity risk to operational infrastructure.
4x OWA 3U pack @ 1 Gbps
Four unidirectional security gateways were deployed to securely transfer update packages from the IT environment to the air-gapped OT network while enforcing strict one-way communication.
SFTP Connector
Update packages and patch repositories are transferred through secure file transfer mechanisms, ensuring reliable delivery of validated update content
Outcomes & Benefits
The deployment enabled the operator to automate patch management for its air-gapped OT infrastructure while maintaining strict cybersecurity protections and regulatory compliance
Achieved full compliance with EU NIS2 and French LPM cybersecurity regulation
Replaced a manual and resource-intensive update process and an unreliable third-party solution
Fully automated the OT patching workflow with no operational overhead
More use cases
- Critical OT & Industry 4.0
- OWA 2U/3U
- Custom SCADA, Siemens WinCC
- SQL Databases Agent
- Critical OT & Industry 4.0
- OWA 2U/3U
- Custom SCADA
- OPC UA Agent
- Critical OT & Industry 4.0
- OWA 2U/3U
- Cisco Splunk
- HTTP/S API, Syslog
- Critical OT & Industry 4.0
- OWA 2U/3U
- Custom SCADA
- SQL Databases Agent
- Critical OT & Industry 4.0
- OWA 2U/3U
- Hexagon PAS
- File Transfer Agent, SMTP
- Critical OT & Industry 4.0
- OWA 2U/3U
- GE OSM (On-Site Manager)
- File Transfer Agent, SFTP, FTP/S/ES
We secure the Critical
— connecting what should stay isolated.
Latest blog entries
- AI & Cybersecurity, Threat Landscape
In 2025, the baseline assumption of industrial cybersecurity broke. For twenty years, defenders had one reliable edge over attackers: time. (…)
- OT Cybersecurity Best Practices, Threat Landscape
Every documented OT breach in the past five years started at the same place: an internet-facing asset that operators believed (…)
- OT Cybersecurity Best Practices, Regulations & Compliance, Threat Landscape
In every major OT cyberattack of the past decade, firewalls were present. In each case, they failed. Not because they (…)
- Architecture Design Patterns, Engineering Insights
Industrial cybersecurity starts with a simple reality: you cannot detect threats if you cannot see what happens inside your OT (…)