Why site-to-site VPNs don’t work at grid edge scale
Discover why traditional site-to-site VPNs fail at grid-edge scale and how Zero Trust can enhance operational security for smart grids and distributed energy deployments.
Smart grids, AMI 2.0 rollouts, substation automation and distributed energy are pushing millions of devices to the grid edge. Teams respond with more APNs and bigger site-to-site VPNs. It works for a while, until it doesn’t. As deployments grow beyond a handful of sites, flat networks become fragile, hard to audit and risky to operate.
Below is a practical look at why VPNs fail at grid-edge scale, what a Zero Trust pattern looks like for OT, and how IXT SecureNet implements it without ripping out what you already have.
VPNs were designed to connect trusted networks. Utilities don’t have “one trusted network” any more; they have thousands of small, intermittently connected sites, many run by contractors, all changing over time. A site-to-site VPN drops every device on one side into the same flat address space as the other. That makes day-to-day ops easy, until an account is phished, a laptop is lost, or a misconfigured rule exposes half your estate.
Meanwhile, field teams need surgical access to one device for one task. VPNs give them a fire hose.
1) Lateral movement from a single compromised credential
Shared VPN accounts or jump hosts are convenient. They also mean a single phished password can see more than it should. Once inside a flat subnet, an attacker can scan, pivot and tamper.
2) Shadow rules and “temporary” exceptions that never die
An urgent fault, a quick firmware push, a contractor who needs access “just for today”. Exceptions pile up, and nobody is fully sure what’s open where.
3) IP allow-lists that don’t match the real world
Dynamic addresses, roaming SIMs and multi-tenant platforms make static IP allow-lists brittle. You either over-permit or lock people out.
4) Over-exposed protocols at the grid edge
RTUs, IED gateways, meters and field controllers speak MQTT, IEC-104, DNP3 and DLMS/COSEM. A flat tunnel can expose management interfaces you never meant to publish.
5) Audit you can’t actually use
VPNs tell you a user connected to a network. They rarely tell you which device they touched, which flows were approved, or when a session truly ended.
Identity first, for people and things
Every device has a strong identity (SIM/eUICC + device posture). Every user does too (MFA/identity provider). No identity, no access.
Approve only the flows a task needs
Define protocols and FQDNs per device type. Allow MQTT to a defined broker, IEC-104/DNP3 to named SCADA headends, DLMS/COSEM to metering systems—and block everything else by default.
Per-session, per-app access
When someone needs to work on a site, grant time-bound access to a single device for a specific protocol. When the job is done, the session auto-expires and the door closes.
Segmentation without flat networks
No site-to-site tunnels that merge subnets. Build thin, temporary paths for specific tasks.
Audit that’s actually useful
Record who accessed which device, for how long, with which protocol, and what policy allowed it. Make it easy to review and revoke.
Our secure IoT SIM gives resilient coverage across borders with multi-IMSI and eUICC profile management. Steer by policy, not luck, and swap profiles over the air to avoid site visits.
Each device gets a cryptographic identity anchored to its SIM/eUICC. Policies follow that identity, so you can enforce controls per device and per fleet, not per subnet.
Approve only the flows your assets need, MQTT, IEC-104/DNP3, DLMS/COSEM or standard IP to defined FQDNs. Everything else is denied by default.
Grant an engineer time-boxed access to a single device/session for maintenance. No broad VPN, no shared jump host. Sessions close automatically.
Every session is logged with identity, device, policy and duration. You get an audit trail you can actually use in incident reviews and compliance checks.
SecureNet layers on top of your existing platforms and APNs where needed. You can phase out flat tunnels at your pace while gaining control and visibility from day one.
VPNs join networks. Utilities need to join people and devices to tasks—briefly, narrowly and with proof. If you’re scaling AMI, substation automation or distributed energy, moving from flat tunnels to per-session, per-app access is the difference between “mostly fine” and “operationally safe”.
Download the utilities edition of our Zero Trust guide to see the pattern, checklists and reference architecture.
Want to prove it? Request a test SIM and we’ll help you pilot just-in-time access on 10–20 sites.
IXT writes about IoT connectivity because we build it. We’re a Full-MVNO with our own core network and a CMP we designed in-house, so we see what works at scale and what doesn’t. Our team has decades of experience in M2M/IoT, from network engineering to enterprise rollouts, so the guidance we share is practical, vendor-agnostic and field-tested. Connect, secure and manage devices with confidence using our IoT Connectivity.
IXT – Connected. Secure. Everywhere.
A: VPNs create a flat, shared network once a tunnel is open, if one device is compromised, attackers can move laterally across sites. They’re also complex to manage at scale and don’t meet modern compliance requirements like NIS2.
A: Zero Trust removes implicit trust. Each device session is verified individually, with least-privilege access and application-level isolation. This means even if one endpoint is breached, the rest of your network remains protected.
A: IXT SecureNet embeds Zero Trust directly into connectivity. It uses private APN/DNN, dual VPN tunnels, and per-session policy enforcement, keeping operational traffic off the public internet while maintaining central visibility through the CMP.
A: Start by deploying IXT Secure SIMs on existing devices. Connect them via SecureNet to segment traffic securely. Use the Connectivity Management Platform (CMP) to monitor data flows, apply policies, and scale gradually across regions.
Explore more articles
Discover why traditional site-to-site VPNs fail at grid-edge scale and how Zero Trust can enhance operational security for smart grids and distributed energy deployments.
Discover the hidden costs of scaling from pilot to 100k IoT devices and learn strategies to manage expenses and ensure efficiency. Read on to optimize your large-scale deployments.
Effective NIS2 compliance for utilities: A practical checklist to secure and manage connected assets, focusing on identity, access control, monitoring, supply chain, and incident response.