Big Data
Cloud Computing
Data Center
Hardware
HR, Finance, Marketing
Internet
IT Management
IT-Security
Mobile
Network
Software
Client: Fortinet
Format: Whitepaper
Size: 1.05 MB
Language: English
Date: 08.04.2024
Demystifying Zero Trust in OT
Operational technology environments are increasingly being connected with IT networks, which can deliver new strategic benefits. This convergence can additionally reduce space requirements, eliminate physical hardware, shorten deployment times, improve cost savings, boost performance, and reduce siloed IT and OT department resources. But these connections also puncture the OT air-gap, thereby deflating the false notions of implied trust and ICS security by design.
The road from implied trust to zero trust isn’t without hurdles or complications. To effectively implement a zero-trust solution such as ZTA within an OT environment, security leaders may need to address some questions that are particular to how ICS operates within the OT environment and any safety-related aspects.
The road from implied trust to zero trust isn’t without hurdles or complications. To effectively implement a zero-trust solution such as ZTA within an OT environment, security leaders may need to address some questions that are particular to how ICS operates within the OT environment and any safety-related aspects.