Download Publication

Who it's for:
- Cybersecurity architects and engineers
- OT and ICS operators and engineers
- IT personnel
- Executive stakeholders
Zero Trust Guidance for Critical Infrastructure
Release Date: 10/28/2024
In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles for securing Critical Infrastructure. As an extensible and holistic enterprise security strategy, Zero Trust is the key for ensuring Critical Infrastructure protection.
More specifically, this document delves into the nuanced application of Zero Trust for Operational Technology and Industrial Control Systems security strategies. First, it clarifies the foundational concepts of Zero Trust. Then, it provides a tailored roadmap for implementing these principles into Operational Technology and Industrial Control Systems settings. This roadmap employs a systematic five-step approach based on the NSTAC Report to the President on Zero Trust.
By leveraging this guidance, organizations will find a clear forward-looking path for continuous improvement of their security postures.
Key Takeaways:
- Unique security risks and threat vectors for Critical Infrastructure
- How Operational Technology converges with digital transformation
- Differences in objectives and architecture of Operational Technology vs traditional Information Technology
- Review of the five-step implementation process for Zero Trust
- How to apply the five-step process to Industrial Controls Systems and Operational Technology security
- How vendors are building Zero Trust capabilities into new technology
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
.jpeg)