Complementary User Entity Controls
This page summarizes the customer security responsibilities for Dispel’s SaaS and on-prem deployments.
Introduction
As part of Dispel’s commitment to security and transparency, we publish this Complementary User Entity Controls (CUECs) document to identify the security responsibilities that rest with our customers. These controls are complementary to those implemented by Dispel and are critical to ensuring that the combined security program for your environment—spanning Dispel’s Zero Trust Engine (ZTE), remote access workflows, micro-segmentation, and threat-detection features—operates effectively.
Because Dispel serves organizations operating in highly regulated sectors—including industrial manufacturing, critical infrastructure, utilities, defense contractors, and operators of OT/ICS environments—we align our CUECs with the frameworks most commonly used by our customers:
IEC 62443-3-3 (System Security Requirements and Security Levels), widely used for OT and industrial control systems; and
NIST SP 800-53 Rev. 5 High Baseline, used across U.S. federal and defense programs and often adopted by enterprises seeking strong cybersecurity controls.
We encourage customers to view Dispel’s controls and their own controls as a shared-responsibility model. Dispel secures the cloud infrastructure, platform features, and connective workflows. Customers secure the assets, identities, networks, and processes they manage.
The specific division of responsibilities depends heavily on how Dispel is deployed, and our customers use Dispel in two distinct ways:
Dispel-Hosted SaaS Deployment — Dispel operates the entire platform infrastructure.
On-Premises / Customer-Cloud Deployment — The platform is deployed fully inside customer-controlled infrastructure, and the customer assumes operational hosting responsibilities.
This document will help you understand how to fulfill your part of both models.
Why Dispel Uses IEC 62443-3-3 and NIST SP 800-53 High
Our customers overwhelmingly operate in sectors subject to rigorous regulatory, operational, and safety requirements. By grounding CUECs in IEC and NIST:
Customers can readily map Dispel’s controls into their existing compliance obligations.
Audit cycles are clearer and faster, as customer-side responsibilities are expressed in a familiar framework.
The shared responsibility structure aligns with global expectations for critical infrastructure and high-assurance systems.
Understanding Complementary User Entity Controls
CUECs identify the security controls the customer must operate so that Dispel’s platform—whether hosted by us or by you—functions securely.
In SaaS deployments, Dispel handles platform hosting, infrastructure security, and system availability.
In On-Prem / Customer-Cloud deployments, customers assume many of those functions and must perform platform-level operations as well as site-level security.
Each section below highlights what customers must do in each deployment model.
Customer Responsibilities by Security Domain
Identity & Access Management (IAM)
Why this matters
Attackers commonly target identities. Dispel integrates with your IdP, but you control authentication upstream.
Customer Responsibilities
SaaS Deployment
Maintain user lifecycle processes for your IdP (provision/de-provision).
Enforce MFA on your enterprise IdP.
Maintain least-privilege role assignments.
Secure customer-managed credentials, API keys, and certificates.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You are responsible for securing, maintaining, and hardening the identity systems you integrate with Dispel.
You must configure, secure, and monitor the authentication infrastructure used by the Dispel instance (e.g., SAML/SCIM endpoints hosted internally).
You are responsible for access control on all platform servers, VMs, and support systems.
Asset, Configuration & Change Management
Why this matters
Dispel secures connectivity; you control the assets connected behind it (PLCs, firewalls, HMIs, servers).
Customer Responsibilities
SaaS Deployment
Maintain inventory of assets behind Dispel micro-segments.
Maintain secure configurations of OT/ICS/IT assets connected to Dispel.
Validate that only authorized assets reside in Dispel segments.
Follow change-control processes for systems integrated with Dispel.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You operate and patch the virtual machines, servers, storage, networking, and OS layers that host the Dispel platform.
You maintain configuration baselines and change control for Dispel platform nodes, load balancers, databases, and endpoint services.
You must ensure secure installation, configuration, and dependency management for all platform components.
Logging, Monitoring & Incident Response
Why this matters
Dispel logs platform activity. Customers log their internal environment.
Customer Responsibilities
SaaS Deployment
Monitor logs for systems not hosted by Dispel (local OT/IT networks).
Maintain and execute your internal IR plan.
Maintain an SIEM/SOC if you so choose.
Designate security contacts for coordination with Dispel.
Perform local containment (e.g., isolating plant networks).
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You must collect, store, protect, and monitor logs generated by the Dispel platform infrastructure itself.
You are responsible for maintaining uptime for monitoring systems (SIEM, log collectors).
You must integrate platform logs into your IR workflow and perform forensic preservation as needed.
You own the patching and security lifecycle of monitoring agents on platform nodes.
Physical & Environmental Security
Why this matters
Physical access defeats digital controls.
Customer Responsibilities
SaaS Deployment
Secure all local OT/ICS assets and workstations.
Protect engineering laptops used to access Dispel.
Maintain environmental protections on local systems.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You must secure the physical servers, racks, data centers, and cloud resources hosting the Dispel platform.
You must ensure environmental controls (power, cooling, humidity) for all platform nodes.
You must physically restrict access to administrative consoles and hardware used by the platform.
Network Security & Communications Integrity
Why this matters
Dispel provides secure transport and micro-segmentation. Customers control surrounding networks.
Customer Responsibilities
SaaS Deployment
Maintain segmentation and firewall rules at your network boundary.
Patch and secure your local networking equipment (firewalls, routers, proxies).
Harden ICS protocols behind your network.
Validate contractor access before issuing credentials.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You secure and operate the network that hosts the Dispel platform, including VLANs, subnets, cloud VPCs, and routing controls.
You must configure secure ingress/egress rules for platform components.
You are responsible for securing local load balancers, API gateways, VPN bridges, and HA pairs used by the platform.
You must protect and isolate platform management interfaces.
Data Governance & Recovery
Why this matters
Customers own their data and must maintain governance over how it is stored, transmitted, and backed up.
Customer Responsibilities
SaaS Deployment
Maintain backups of any data stored outside Dispel’s cloud.
Classify and handle data according to your internal policies.
Manage customer-owned materials used in integrations.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You must back up and restore the Dispel platform infrastructure (databases, configs, platform nodes, etc.).
You must ensure secure storage, rotation, and protection of any encryption keys used by the platform.
You are responsible for backup media protection and disaster recovery processes for the entire deployment.
Endpoint Security
Why this matters
Compromised endpoints undermine remote access security regardless of platform protections.
Customer Responsibilities
SaaS Deployment
Harden and monitor endpoints accessing Dispel (antivirus/EDR, secure configuration, patching).
Secure target jump hosts or HMIs connected to through Dispel.
On-Prem / Customer-Cloud Deployment
All SaaS responsibilities plus:
You must secure the endpoints hosting Dispel platform services:
Admin consoles
Deployment servers
Orchestration servers
Any underlying OSes
You must maintain patching, vulnerability scanning, and malware protection for all platform nodes.
Last updated

