The Digital Factory - Architecture - Part 3

[ST # 79] ✅ Industry Reference Architectures, Patterns, implementation examples, security controls and CISOs changing role. [Securing Things by M. Yousuf Faisal]

Disclaimer: All views presented here, in this newsletter, are my own.

Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.

M. Yousuf Faisal

Hey there,

Hope you are doing well. This is Part 3 of “The Digital Factory” series.

In case you’ve missed first two parts, checkout:

  • Part 1 - The Digital Factory (4.0) - Hub & Spoke - we covered what is industry 3.0, industry 4.0, digital factory and UNS concepts. Concluded that these new approaches, challenges the status quo for industry 3.0 and generates a debate around the “questionable” use of Purdue model for network segmentation - whether its dead or alive, reference network architectures and why Security folks are in a fist fight most of the time with solution architects and or automation professionals.

  • Part 2 - The Digital Factory (4.0) - Data Flow - we covered industrial DataOps, industry 4.0 data flow lifecycle, DataOps and security considerations. <data flow * and tie it together add comments>

In Part 3 - The Digital Factory (4.0) - Architecture, we’ll be covering:

  • 📘 Industry 4.0 Reference Architecture Battle Royale - which reference model and or reference architecture for industry 4.0/>?

    • RAMI 4.0 | Purdue Model / ISA-95 segmentation | IIRA | UNS based | Event driven architecture - Experts & Gartner’s position.

  • ✍️ ISA/IEC 62443 Cloud Verdict on essential functions - ISA position

  • 📘Patterns in practical reference architectures & Implementation examples

  • ✍️ Security & operational basic checklist.

Am excited, are you Ready? If so, let’s dig in.

Yours truly.

— Yousuf.

Together with:

Privacy-first email. Built for real protection.

End-to-end encrypted, ad-free, and open-source. Proton Mail protects your inbox with zero data tracking.

But before we begin, do me a favour and make sure you hit the “Subscribe” button to let me know that you care or liked and keep me motivated to publish more. Thanks!

📘 Industry 4.0 Reference Architecture Battle Royale

The reference architectures powering Industry 4.0: RAMI, Purdue, IIRA, Unified Namespace, and cloud-native stacks — what works in the world’s most automated factories?

Modern smart factories are built on common architectural patterns rather than bespoke point-to-point wiring.

Over the last decade a handful of reference architectures and patterns have become the industry’s “gold standards” — RAMI 4.0, the Purdue/ISA layering model, the Industrial Internet Reference Architecture (IIRA), Unified Namespace (UNS) event-driven designs, and cloud vendor reference stacks (AWS/Azure).

Below I summarize each, show how they compose together in real deployments, and highlight practical case studies from Amazon, Tesla, and major automation vendors. 

The Landscape: Multiple Architectures, One Clear Winner Emerging

Three major reference architectures dominate, but there's a dark horse changing everything:

The Established Players:

  • RAMI 4.0 (Germany): 3D framework focused on manufacturing with lifecycle integration

  • IIRA (USA): Industrial Internet Reference Architecture emphasizing broad applicability

  • IVRA (Japan): Industrial Value Chain Reference Architecture for connected industries

The Game Changer: Unified Namespace (UNS)

UNS is emerging as the evolution beyond traditional pyramid architectures. Unlike hierarchical models, UNS creates a single source of truth for all industrial data using MQTT as the backbone.

Why UNS Matters:

  • Eliminates point-to-point integration complexity

  • Enables real-time data access across all systems

  • Supports modern IIoT and edge computing naturally

The Shift: We're moving from vertical hierarchy (Purdue) to horizontal data fabric (UNS).

Drop in your best email address to subscribe and continue reading the rest of the newsletter edition for free.

Subscribe to keep reading

This content is free, but you must be subscribed to Securing Things Newsletter to continue reading.

I consent to receive newsletters via email. Terms of use and Privacy policy.

Already a subscriber?Sign in.Not now

Reply

or to participate.