Zero Trust for utilities: a better way than site-to-site VPNs
Enhance utility network security with Zero Trust principles. Learn how IXT SecureNet offers precise, per-session access control and robust auditing, replacing fragile site-to-site VPNs.
Smart grids, AMI 2.0 rollouts, substation automation and distributed energy are pushing millions of devices to the grid edge. Teams respond with more APNs and bigger site-to-site VPNs. It works for a while. Until it doesn’t. As deployments grow beyond a handful of sites, flat networks become fragile, hard to audit and risky to operate.
Below is a practical look at why VPNs fail at grid-edge scale, what a Zero Trust pattern looks like for OT, and how IXT SecureNet implements it without ripping out what you already have.
VPNs were designed to connect trusted networks. Utilities don’t have “one trusted network” any more; they have thousands of small, intermittently connected sites, many run by contractors, all changing over time. A site-to-site VPN drops every device on one side into the same flat address space as the other. That makes day-to-day ops easy. Until an account is phished, a laptop is lost, or a misconfigured rule exposes half your estate.
Meanwhile, field teams need surgical access to one device for one task. VPNs give them a fire hose.
Shared VPN accounts or jump hosts are convenient. They also mean a single phished password can see more than it should. Once inside a flat subnet, an attacker can scan, pivot and tamper.
An urgent fault, a quick firmware push, a contractor who needs access “just for today”. Exceptions pile up, and nobody is fully sure what’s open where.
Dynamic addresses, roaming SIMs and multi-tenant platforms make static IP allow-lists brittle. You either over-permit or lock people out.
RTUs, IED gateways, meters and field controllers use protocols like MQTT, IEC-104, DNP3 and DLMS/COSEM. With a flat site-to-site VPN, you don’t just permit those flows, you also make devices’ admin ports (web, SSH, SNMP, vendor maintenance) reachable across the tunnel. That unintended exposure widens the attack surface
VPNs tell you a user connected to a network. They rarely tell you which device they touched, which flows were approved, or when a session truly ended.
Every device has a strong identity (SIM/eUICC + device posture). Every user does too (MFA/identity provider). No identity, no access.
Define protocols and FQDNs per device type. Allow MQTT to a defined broker, IEC-104/DNP3 to named SCADA headends, DLMS/COSEM to metering systems—and block everything else by default.
When someone needs to work on a site, grant time-bound access to a single device for a specific protocol. When the job is done, the session auto-expires and the door closes.
No site-to-site tunnels that merge subnets. Build thin, temporary paths for specific tasks.
Record who accessed which device, for how long, with which protocol, and what policy allowed it. Make it easy to review and revoke.
Our secure IoT SIM gives resilient coverage across borders with multi-IMSI and eUICC profile management. Steer by policy, not luck, and swap profiles over the air to avoid site visits.
Each device gets a cryptographic identity anchored to its SIM/eUICC. Policies follow that identity, so you can enforce controls per device and per fleet, not per subnet.
Approve only the flows your assets need, MQTT, IEC-104/DNP3, DLMS/COSEM or standard IP to defined FQDNs. Everything else is denied by default.
Grant an engineer time-boxed access to a single device/session for maintenance. No broad VPN, no shared jump host. Sessions close automatically.
Every session is logged with identity, device, policy and duration. You get an audit trail you can actually use in incident reviews and compliance checks.
SecureNet layers on top of your existing platforms and APNs where needed. You can phase out flat tunnels at your pace while gaining control and visibility from day one.
VPNs join networks. Utilities need to join people and devices to tasks. Briefly, narrowly and with proof. If you’re scaling AMI, substation automation or distributed energy, moving from flat tunnels to per-session, per-app access is the difference between “mostly fine” and “operationally safe”.
A: Grid-edge systems include thousands of distributed assets, meters, EV chargers, substations, often on public or third-party networks. This decentralisation increases exposure and makes static VPN tunnels hard to manage securely.
A: VPNs rely on static tunnels between fixed sites. At grid scale, each new device or site adds manual setup, certificates, and maintenance overhead. Once a tunnel is open, it also exposes the entire network segment to risk.
A: Zero Trust removes permanent tunnels and authenticates each session dynamically. Access is granted only to specific apps or data, not full networks. Combined with private routing, it reduces attack surface while improving manageability.
A: IXT SecureNet applies Zero Trust to connectivity itself, using private APN/DNN, dual VPN tunnels, and session-level policies. With Secure SIMs and the CMP, utilities can monitor, control, and expand securely across regions.
IXT writes about IoT connectivity because we build it. We’re a Full-MVNO with our own core network and a CMP we designed in-house, so we see what works at scale and what doesn’t. Our team has decades of experience in M2M/IoT, from network engineering to enterprise rollouts, so the guidance we share is practical, vendor-agnostic and field-tested. Connect, secure and manage devices with confidence using our IoT Connectivity.
IXT – Connected. Secure. Everywhere.
Related articles
Enhance utility network security with Zero Trust principles. Learn how IXT SecureNet offers precise, per-session access control and robust auditing, replacing fragile site-to-site VPNs.
Discover the true cost of IoT SIMs, including hidden fees and pricing models, while learning how to use IXT's pricing calculator for accurate estimates.
Learn how to maintain consistent IoT security policies across borders. Covers private APNs, Zero Trust architecture, multi-network resilience, and data residency compliance for global device fleets.