Control Path Protection for Upstream, Midstream, and Refinery
Oil and gas operations span remote wellheads, offshore platforms, pipelines, and refineries. Each environment runs safety-critical control systems that must remain isolated from corporate networks and external threats.
Oil and Gas
In oil and gas, a compromised control system is not a data breach. It is a potential safety incident with consequences measured in lives, environmental damage, and billions in liability.
100%
DCS and SIS isolation from corporate IT
Zero
Persistent vendor paths to safety systems
5
Operational zones with independent governance
Full
IEC 62443 and NIS2 compliance evidence
Oil and gas face converging cyber-physical risks.
Safety System Exposure
Safety instrumented systems increasingly share network infrastructure with DCS and business systems, creating paths to the last line of defence against catastrophic events.
Remote Operations
Offshore platforms and remote wellheads rely on satellite and radio communications for control, with limited visibility into who is accessing what.
Contractor Access
Dozens of specialist contractors require access to different control systems, each creating persistent pathways that outlive the maintenance window.
The Scenario
Scenario: Refinery DCS Compromise via Contractor VPN
Attackers compromise a control system integrator through a targeted phishing campaign. Using the integrator's VPN credentials, they access the refinery DCS network through a maintenance connection that was left active between scheduled visits. Over three weeks, they map the process control network and deploy modified logic on key programmable controllers. When activated, the modified logic causes a distillation column to operate outside safe parameters. The safety instrumented system should intervene, but its engineering workstation was reachable from the same network segment. With Firevault Control, the contractor VPN path is physically severed between maintenance windows. The SIS exists on a separate, disconnected network. The attack cannot reach safety systems because the path does not exist.
"We had 23 active contractor VPN tunnels into our DCS network. When we audited them, seven belonged to contractors whose projects had ended more than a year ago. The tunnels were still live."
Physical governance for process control environments.
Oil and gas operators gain physical control over every network path into DCS, SIS, and remote operations infrastructure. Contractor access exists only during authorised windows. Safety systems remain physically disconnected from all other networks. Recovery from sophisticated attacks is guaranteed through air-gapped archives.
- Physical separation between DCS, SIS, and corporate networks
- Contractor paths that do not exist outside maintenance windows
- Multi-party authorisation involving operations and HSE teams
- Out-of-band management for offshore and remote facilities
- Continuous IEC 62443 and NIS2 compliance evidence
- Air-gapped recovery for safety system configurations
Fracture, Emergency Process Isolation
Module 1 of 4Physically severs network connections between process zones during active threats. When a compromise is detected in one area, Fracture prevents lateral movement into adjacent process units or safety systems.
Key Capabilities
Sovereign Process Data
All process control configurations and safety system logic remain within the agreed jurisdiction in NATO-approved Firevault Bunkers.
Multi-Party Access Control
Contractor and vendor access requires sign-off from both operations and HSE teams before any path is activated.
IEC 62443 Evidence
Automated compliance logging maps directly to IEC 62443 zone and conduit requirements and NIS2 Article 21 outcomes.
Satellite Failover
Out-of-band management ensures control plane access to offshore and remote facilities independent of primary communications.
Tamper-Proof Logging
Every contractor session, configuration change, and access authorisation is recorded in immutable logs on physically separate infrastructure.
Air-Gapped Safety Backups
Physically disconnected copies of SIS logic and safety configurations ensure restoration capability during total compromise scenarios.
Demo to Live
Adoption Guide
Process Network Assessment
Map all network paths between corporate IT, DCS, SIS, and contractor access points across upstream, midstream, and downstream operations.
Zone and Conduit Design
Design physically separated zones aligned to IEC 62443 requirements with Control modules governing each conduit between zones.
Single Facility Pilot
Deploy at one facility with full zone separation, contractor access governance, and compliance logging to validate operational procedures.
Enterprise Rollout
Phased deployment across all facilities with air-gapped recovery, continuous compliance evidence, and out-of-band management.
Process Network Assessment
Map all network paths between corporate IT, DCS, SIS, and contractor access points across upstream, midstream, and downstream operations.
Zone and Conduit Design
Design physically separated zones aligned to IEC 62443 requirements with Control modules governing each conduit between zones.
Single Facility Pilot
Deploy at one facility with full zone separation, contractor access governance, and compliance logging to validate operational procedures.
Enterprise Rollout
Phased deployment across all facilities with air-gapped recovery, continuous compliance evidence, and out-of-band management.
Win Business, Earn Trust, and Build Reputation with Butterfly
Butterfly is an operational model that helps organisations structure sensitive data to close deals faster, strengthen client relationships, and demonstrate the governance maturity that wins enterprise contracts.
Built on the VPPP framework (Vault, Policy, Permissions, Purpose), Butterfly maps your sensitive data and assigns dedicated Vaults by role, relationship, and purpose, turning data stewardship into a competitive advantage.
Deal Readiness
Governed materials ready to share with confidence
Client Trust
Demonstrate stewardship that earns loyalty
Board Confidence
Clear governance that inspires stakeholders
Enterprise Scale
Structure data governance across your organisation

Who Uses Butterfly?
-
Sales Teams
Secure client proposals, pricing, and commercial intelligence
-
Service Providers
Exchange sensitive documents with clients through governed Vaults
-
Businesses
Protect strategic plans, IP, and competitive intelligence
-
Family Offices
Structure data governance across principals, staff, and advisors
Explore More
Control for Critical Infrastructure
National-grade security for essential services.
Learn more about Control for Critical InfrastructureIEC 62443 Framework
Industrial automation security and Purdue model compliance.
Learn more about IEC 62443 FrameworkSupply Chain Threat
Disconnect third-party paths when not in active use.
Learn more about Supply Chain ThreatControl for OT Environments
Physical-path governance for SCADA, ICS and industrial control data.
Learn more about Control for OT EnvironmentsControl for Utilities
Zone and conduit governance for power, water and gas networks.
Learn more about Control for UtilitiesNIS2 Framework
Article 21 outcomes evidenced through physical path governance.
Learn more about NIS2 FrameworkQuestions
Frequently Asked
Ready to take the next step?
See how Control can govern your data paths with physical enforcement no software exploit can bypass.
Speak to the team to organise a PoC
Walk through your blueprint with the Firevault team and scope a proof of concept on your estate. 30 minutes, no sales pitch.