Cloud 101CircleEventsBlog
Join CSA's Virtual FinCloud Security Summit to explore cloud security solutions, emerging fintech trends, and best practices for secure, compliant financial services.

Download Publication

Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
Who it's for:
  • Cybersecurity architects and engineers
  • OT and ICS operators and engineers
  • IT personnel
  • Executive stakeholders

Zero Trust Guidance for Critical Infrastructure

Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles for securing Critical Infrastructure. As an extensible and holistic enterprise security strategy, Zero Trust is the key for ensuring Critical Infrastructure protection. 

More specifically, this document delves into the nuanced application of Zero Trust for Operational Technology and Industrial Control Systems security strategies. First, it clarifies the foundational concepts of Zero Trust. Then, it provides a tailored roadmap for implementing these principles into Operational Technology and Industrial Control Systems settings. This roadmap employs a systematic five-step approach based on the NSTAC Report to the President on Zero Trust.

By leveraging this guidance, organizations will find a clear forward-looking path for continuous improvement of their security postures.

Key Takeaways:
  • Unique security risks and threat vectors for Critical Infrastructure
  • How Operational Technology converges with digital transformation
  • Differences in objectives and architecture of Operational Technology vs traditional Information Technology
  • Review of the five-step implementation process for Zero Trust
  • How to apply the five-step process to Industrial Controls Systems and Operational Technology security
  • How vendors are building Zero Trust capabilities into new technology
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
Related resources
Zero Trust Guidance for Critical Infrastructure - Japanese Translation
Zero Trust Guidance for Critical Infrastructure...
Context-Based Access Control for Zero Trust
Context-Based Access Control for Zero Trust
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)
Zero Trust Guidance for Small and Medium Size B...
AI-Generated Attacks Are Here. Zero Trust Is How We Fight Back.
AI-Generated Attacks Are Here. Zero Trust Is How We Fight Back.
Published: 01/16/2025
The EU AI Act: A New Era of AI Governance Began August 1st
The EU AI Act: A New Era of AI Governance Began August 1st
Published: 01/15/2025
Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success
Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructur...
Published: 01/14/2025
The Emerging Cybersecurity Threats in 2025 - What You Can Do To Stay Ahead
The Emerging Cybersecurity Threats in 2025 - What You Can Do To Sta...
Published: 01/14/2025

Acknowledgements

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Jennifer Minella Headshot Missing
Jennifer Minella

Jennifer Minella

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Dr. Ron Martin
Dr. Ron Martin
Professor of Practice at Capitol Technology University

Dr. Ron Martin

Professor of Practice at Capitol Technology University

Dr. Martin is a Professor of Practice at Capitol Technology University. His work at Capitol Technology University is in the following functional areas Critical Infrastructure, Industrial Control System Security, Identity, Credential, and Access Management. Ron has relationships with a diverse mix of businesses. He serves as a board of directors for many profit and non-profit organizations. Ron retired from the United States (U. S.) Army in ...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training