How to Apply a Zero Trust Security Model to ICS

Source
Advertisement


A zero trust strategy establishes rules and good practices to improve the security and resiliency of your IT infrastructure, but what can it do for operational technologies (OT)? It turns out, quite a bit – but there are limits.

Last fall, my colleague Greg Young wrote a blog post IoT and Zero Trust are Incompatible? Just the Opposite, which opened the door to a worthy discussion on which elements of zero trust are applicable to an OT environment.

Advertisement