Meridian Ship-to-ShoreCybersecurity Reference Architecture
Re-stratification of the Meridian systems-integration model along Purdue Model zones, with explicit
Active Directory segregation per level, zero-trust crossings, code-signed broker patterns, and an emergency
event-management overlay (ServiceNow · Everbridge · Ekatra). Click any component for control posture and
maritime impact.
View Filter
PRINCIPLE 01
Shore observes & governs — never controls
Corporate / cloud platforms read telemetry and orchestrate work, but cannot reach into safety-critical OT zones.
PRINCIPLE 02
Identity is segmented by Purdue level
No two-way AD trust between corporate and OT domains. Identity terminates at the DMZ — never inside L2 or L0/1.
PRINCIPLE 03
Every cross-zone agent is code-signed
MID Servers, OT collectors, and brokers run only signed binaries with certificate-based device identity and TLS 1.3.
PRINCIPLE 04
Vessels remain operational without shore
Loss of satellite, cloud identity, or shore platforms must never degrade propulsion, navigation, or safety systems.