The Purdue Model

A comprehensive reference architecture for industrial control systems that provides structured organization of operational technology (OT) and information technology (IT) systems across hierarchical levels.

How to Use This Application

Follow these steps to maximize your cybersecurity analysis and protection capabilities

1

Navigate the Architecture

Click the "Architecture" tab to explore the interactive Purdue Model with all hierarchical levels from physical devices to enterprise systems.

2

Explore Devices

Click any device card to open detailed information including security considerations, MITRE ATT&CK techniques, and historical incidents.

3

Analyze Threat Intelligence

Review comprehensive threat intelligence data to understand device-specific risks and implement appropriate security measures.

4

Apply Security Best Practices

Use the security recommendations and MITRE ATT&CK mappings to enhance your industrial cybersecurity posture.

Loading...