Key Takeaways
- CISA’s guide “Adapting Zero Trust Principles to Operational Technology” provides a practical roadmap for applying zero trust in OT environments constrained by legacy systems, uptime requirements, and limited visibility.
- Zero trust in OT must balance security with safety, reliability, and continuous operation, assuming breach has already occurred.
- Success hinges on comprehensive asset visibility, strong identity and access controls, supply‑chain risk management, and layered defenses such as network segmentation and secure communications.
- Effective implementation requires close collaboration between OT, IT, and cybersecurity teams, shared governance, and compensating controls when perfect zero trust is not feasible.
- Monitoring, endpoint detection, incident response, and recovery strategies must be tailored to OT’s physical‑consequence reality, using passive monitoring, behavioral baselines, and tested recovery plans.
Overview of CISA’s Zero Trust Guidance for OT
The Cybersecurity and Infrastructure Security Agency (CISA), together with the Departments of Defense, Energy, State, and the FBI, released a 28‑page guide titled Adapting Zero Trust Principles to Operational Technology. The document translates zero trust concepts—originally designed for IT networks—into actionable steps for OT settings that often contend with legacy hardware, minimal logging, and strict availability demands. It aligns with the NIST Cybersecurity Framework (CSF) 2.0, organizing outcomes around the Govern, Identify, Protect, Detect, Respond, and Recover functions to help organizations prioritize and implement zero trust while respecting OT constraints.
Why Zero Trust Is Essential in Modern OT
As OT systems become increasingly interconnected, digitally monitored, and remotely operated, the attack surface expands dramatically. Convergence with IT networks creates new pathways for threat actors to move from compromised IT assets into operational environments, as illustrated by campaigns like Volt Typhoon. Legacy OT devices, long lifecycles, and limited security support amplify risk, and a successful breach can cause physical harm—disrupting power grids, damaging equipment, endangering personnel, or contaminating water supplies. Traditional perimeter‑based defenses are insufficient; zero trust, which assumes breach and enforces least‑privilege access, offers a more resilient posture tailored to OT’s operational realities.
Aligning Zero Trust with NIST CSF Functions
The guide maps zero trust practices to the six core functions of NIST CSF 2.0. Under Govern, it stresses establishing clear policies, risk tolerances, and cross‑disciplinary accountability. Identify calls for a thorough asset inventory—hardware, software, communications—as the foundation for any zero trust effort. Protect emphasizes identity and access management, network segmentation, secure communication protocols, and vulnerability management. Detect focuses on monitoring high‑risk junctions (OT‑IT interfaces) using passive monitoring, baseline‑based, and specification‑based detection. Respond and Recover sections outline tailored incident response plans, containment strategies that involve process engineers, and recovery procedures grounded in tested backups and engineering documentation.
Governance: Bridging OT and Cybersecurity Cultures
Effective zero trust begins with governance that brings together plant managers, engineers, system integrators, and security teams. Personnel who can speak both OT safety language and cybersecurity threat modeling are invaluable. Clear risk tolerances and escalation paths must be defined, especially for remote access and break‑glass scenarios where zero trust controls could clash with safety or availability. Siloed decision‑making is discouraged; shared accountability and collaborative problem‑solving are essential to implement compensating controls—such as out‑of‑band anomaly detection or network segmentation—when a strict zero trust rule would disrupt operations.
Procurement and Supply Chain as Strategic Levers
In OT environments still reliant on legacy infrastructure, procurement offers a powerful opportunity to improve security. Newer components can provide built‑in security logging, identity management, and secure communication protocols that older equipment lacks. The guide urges organizations to scrutinize vendors for Software Bills of Materials (SBOMs), vulnerability management practices, and CVE authority status, particularly when SBOMs are unavailable for legacy systems. Third‑party access must be authorized, monitored, and technically controlled; at minimum, a method to limit and oversee who gains entry is required because supply‑chain risk often remains hidden until exploited.
Building the Foundation: Asset Visibility and Inventory
Before any zero trust architecture can be deployed, organizations must know what they own. A comprehensive asset inventory—encompassing hardware, software, systems, and communication paths—is the starting point. In OT, passive monitoring via SPAN ports or network TAPs is preferred to avoid knocking offline fragile legacy components through active scanning. Proprietary protocols, air‑gapped segments, and cost considerations may yield an incomplete picture initially, but the guide stresses that the effort is non‑optional; thoughtful sensor placement and incremental improvement yield a usable baseline for change management, which in OT must be deliberate, safety‑reviewed, and backed‑up before implementation.
Monitoring: Where Zero Trust Proves Its Value
Monitoring is the litmus test for zero trust in OT. The highest priority lies at OT‑IT interfaces and external connections, where unexpected inbound traffic or anomalous commands often signal segmentation failures. CISA’s open‑source SIEM tool Malcolm, equipped with Zeek parsers for common OT protocols, offers a practical entry point for deep traffic analysis. Passive monitoring remains effective given OT’s relatively static behavior, making deviations easier to detect. Baseline‑based detection uses statistical models to flag outliers, while specification‑based detection defines acceptable behavior ranges. Operator involvement reduces false positives and builds shared utility between cybersecurity and engineering teams, ensuring alerts are actionable without disrupting safety‑critical processes.
Endpoint Detection Challenges in OT
Standard endpoint detection and response (EDR) agents often cannot run on legacy OT components below the HMI or engineering workstation due to performance constraints, tightly coupled application‑OS designs, or warranty prohibitions. Cloud‑connected EDR solutions exacerbate the issue in air‑gapped or isolated networks where outward calls are blocked. The guide recommends a staging server in the DMZ that pushes updates without requiring bidirectional agent communication, allowing security updates while preserving network isolation. For Living‑off‑the‑Land (LOTL) attacks—where adversaries abuse legitimate tools like PowerShell, WMI, or vendor programming software—detection must rely on behavioral and heuristic analysis rather than simple access controls, with carefully scoped rules to avoid interfering with operator workflows or safety functions.
Incident Response: Planning for the Assumed Breach
Zero trust’s core assumption—that a breach has already occurred—shapes OT incident response (IR). IR plans must be tailored, tested, and deeply specific, incorporating decision matrices, flowcharts, and MITRE ATT&CK‑informed playbooks. Contact lists and communication protocols should be current before an incident. Critical decisions, such as whether to shut down a safety network versus isolating an engineering workstation, must be predetermined; safety‑related shutdowns are justified when financial loss is recoverable but safety incidents are not. Regular review (quarterly) and testing (at least annually) ensure readiness, with immediate revisits after geopolitical spikes, natural disasters, or threat‑environment changes.
Containment and Recovery: Coordinating Security with Operations
Containment in OT differs from IT because aggressive network isolation can trigger safety incidents, damage equipment, or force costly shutdowns that may rival the impact of the breach itself. Security teams must collaborate with process engineers and operations staff to define isolation procedures, who is authorized to execute them, and what contingencies exist. Physical access controls, least‑privilege principles, and just‑in‑time access reduce the attack surface pre‑emptively. Recovery hinges on comprehensive backups—OS configurations, application software, engineering logic, I/O lists, startup values—and on maintaining current engineering documentation, cause‑and‑effect matrices, and licensed restoration software. Backup integrity should be verified regularly via hashing or checksum testing, and business continuity plans must explicitly integrate cyber incident scenarios rather than treating them as IT annexes.
The Path Forward: Collaboration, Layered Controls, and Realistic Goals
Ultimately, the CISA guide affirms that achieving zero trust in OT is not about attaining perfection or zero risk but about making informed, deliberate decisions that reduce exposure while preserving mission‑critical operations. Success requires a holistic approach: comprehensive asset visibility, robust identity and access management, proactive supply‑chain risk management, and layered defenses such as network segmentation, secure communication protocols, and rigorous vulnerability management. Equally vital is breaking down organizational silos, fostering mutual understanding between IT, OT, and cybersecurity teams, and tailoring zero trust principles to each environment’s unique safety, reliability, and operational demands. By embracing this balanced, collaborative stance, critical infrastructure owners and operators can enhance resilience against evolving cyber threats without compromising the physical processes they safeguard.

