Glossary

Protocol Isolation

Identity Access Management

What is Protocol Isolation?


Protocol Isolation is a cybersecurity technique that separates user endpoints from direct interaction with backend systems by brokering communication through a secure gateway. Instead of allowing native network-layer connections (e.g., RDP, SSH, VNC, HTTP/S), the user connects to an isolated proxy that mediates the session using specific protocols without placing the user or their device on the same network as the target system. Protocol isolation enforces strict control over how users access critical systems and eliminates the risk of lateral movement, malware propagation, or direct attacks on OT and IT assets.


Why is Protocol Isolation Important?


Traditional access methods such as VPNs, jump servers, or desktop clients, establish direct network paths between the user and critical infrastructure, even if credential controls are in place. This network-layer exposure allows threat actors to scan, pivot, or exploit vulnerable systems if the user’s session or device is compromised.

Protocol isolation removes this risk by decoupling the user from the system’s network. Users interact with applications and systems via proxied sessions, where only authorized protocol traffic (e.g., RDP or SSH) is allowed and only through the isolation layer. This creates a one-way control flow where the backend system never directly interacts with the user’s device or identity context.

In Operational Technology (OT) and Cyber-Physical Systems (CPS) environments, where legacy systems often lack modern security features, protocol isolation is critical. It supports compliance with IEC 62443, NERC CIP-005, TSA SD02E, and Zero Trust Architecture by ensuring only specific, controlled interactions occur without expanding the attack surface or requiring software agents.



How Does Xona Help with Protocol Isolation?


Xona enforces protocol isolation by acting as a hardened access gateway that proxies user sessions over authorized protocols like RDP, SSH, VNC, and HTTP/S, without placing users on the OT or ICS network. All access occurs through a browser-based interface, with no need for agents, VPNs, or direct routing between the user and the system.

This design ensures:

  • No lateral movement is possible.
  • No direct IP visibility into critical assets.
  • No credentials are exposed to the user (thanks to credential injection).
  • All session activity is recorded and governed.

Xona’s protocol isolation model delivers Zero Trust enforcement at the protocol layer ensuring that even if a user device is compromised, critical systems remain segmented, secure, and auditable. This is especially vital in high-risk, regulated environments where segmentation alone is insufficient to prevent breaches.



Frequently Asked Questions

How does protocol isolation differ from traditional remote access methods like VPNs or jump servers?

Protocol isolation proxies user sessions at the protocol level without creating direct network paths, unlike VPNs or jump servers which expose internal networks to external endpoints.

Why is protocol isolation critical in OT and ICS environments?

It prevents lateral movement, malware propagation, and direct asset exposure to insecure user endpoints, which is essential in environments where systems lack native security controls.

What protocols are typically supported in a protocol isolation model?

Commonly supported protocols include RDP, SSH, VNC, and HTTP/S, all proxied through a secure intermediary to enforce session-level isolation.

Can protocol isolation help meet compliance requirements for critical infrastructure?

Yes, it supports key requirements in IEC 62443, NERC CIP-005, TSA SD02E, and Zero Trust guidelines by enforcing network segmentation, session control, and auditable access.

Does protocol isolation eliminate the need for endpoint security agents?

Protocol isolation allows secure access without installing agents on user or target systems, making it ideal for legacy OT assets and third-party users.

How does Xona implement protocol isolation in its access platform?

Xona proxies all user sessions through a hardened gateway that enforces protocol-level separation, credential injection, and full session monitoring to ensure users never directly connect to OT systems.