Skip to main content
The Dragos Blog

06.12.24 | 1 min read

Implementing Zero Trust in Operational Technology (OT) Environments  

Dragos, Inc.

 Zero Trust is a change in the security model away from network-based security to an application and data-centric view. Zero Trust is often associated with new methods of remote access to applications, especially modern cloud applications. Zero Trust includes several concepts – like strong authentication, limiting of access/authorization to resources, data protection, and monitoring of sessions – that are helpful to many security designs.  

Operational Technology (OT) environments work on an inherent trust model – which is quite the opposite of Zero Trust. That is one of many issues that make Zero Trust elusive in OT. Yet some of the concepts of Zero Trust can help to improve the cybersecurity of OT environments.

Download Our Guide to Applying Zero Trust Concepts in OT Environments

Learn more about how you can borrow a few key elements of Zero Trust that can help your OT cybersecurity posture. 

Download Now

Application access is:

  • Granted only after identity is authenticated.
  • Authorized only to specifically prescribed resources at the application and data level, not the network level.
  • Adjusted based on context-derived risk such as by user, access level, device, time of day, network, geo location, etc.
  • Encrypted end-to-end.
  • Monitored continuously and analyzed for changes to risk profile.

However, Zero Trust doesn’t map well to OT environments, which rely on inherent trust, are operating many legacy applications, are interoperability imperative, and are sensitive network environments.

Enter the SANS 5 Critical Controls for ICS Cybersecurity, which are purpose built for OT. You’ll find many similar concepts illustrated by the SANS ICS 5 Critical Controls that are shared with Zero Trust and can be translated into strong controls that protect our most critical infrastructure. 

Download Our Guide on Zero Trust

Download our guide to learn more about how you can borrow a few key elements of Zero Trust that can help improve your OT cybersecurity posture. 

SKIP

        Ready to put your insights into action?

        Take the next steps and contact our team today.