Guide

Guide to Applying Zero Trust Concepts in OT Environments

Guide to Applying Zero Trust Concepts in OT Environments

Pages 10 Pages

Making Remote Access into OT More Secure - As a reminder, zero trust access is granted only after identity is authenticated, is restricted to specific resources, authorization is done at the application level, is adjusted based on risk derived from identity and context (device, time of day, network, geo location), and is encrypted end to end. These concepts seem to improve remote access architecture and have been adopted by vendors who participate in Zero Trust Network Access (ZTNA). Zero Trust is good. It’s mostly about remote access but provides useful lessons when architecting security parameters in any application environment, including Operational Technology.

Join for free to read