ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Download Publication

Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
Who it's for:
  • Cybersecurity architects and engineers
  • OT and ICS operators and engineers
  • IT personnel
  • Executive stakeholders

Zero Trust Guidance for Critical Infrastructure

Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles for securing Critical Infrastructure. As an extensible and holistic enterprise security strategy, Zero Trust is the key for ensuring Critical Infrastructure protection. 

More specifically, this document delves into the nuanced application of Zero Trust for Operational Technology and Industrial Control Systems security strategies. First, it clarifies the foundational concepts of Zero Trust. Then, it provides a tailored roadmap for implementing these principles into Operational Technology and Industrial Control Systems settings. This roadmap employs a systematic five-step approach based on the NSTAC Report to the President on Zero Trust.

By leveraging this guidance, organizations will find a clear forward-looking path for continuous improvement of their security postures.

Key Takeaways:
  • Unique security risks and threat vectors for Critical Infrastructure
  • How Operational Technology converges with digital transformation
  • Differences in objectives and architecture of Operational Technology vs traditional Information Technology
  • Review of the five-step implementation process for Zero Trust
  • How to apply the five-step process to Industrial Controls Systems and Operational Technology security
  • How vendors are building Zero Trust capabilities into new technology
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust
Published: 09/26/2025
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lessons in Third-Party Access Visibility
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lesso...
Published: 09/25/2025
Do Your CI/CD Pipelines Need Identities? Yes.
Do Your CI/CD Pipelines Need Identities? Yes.
Published: 09/22/2025
Identity Security: Cloud’s Weakest Link in 2025
Identity Security: Cloud’s Weakest Link in 2025
Published: 09/19/2025

Acknowledgements

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Jennifer Minella Headshot Missing
Jennifer Minella

Jennifer Minella

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Dr. Ron Martin
Dr. Ron Martin
Professor of Practice at Capitol Technology University

Dr. Ron Martin

Professor of Practice at Capitol Technology University

Dr. Martin is a Professor of Practice at Capitol Technology University. His work at Capitol Technology University is in the following functional areas Critical Infrastructure, Industrial Control System Security, Identity, Credential, and Access Management. Ron has relationships with a diverse mix of businesses. He serves as a board of directors for many profit and non-profit organizations. Ron retired from the United States (U. S.) Army in ...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training