Zero trust is a security model that emphasizes strict access controls, least privilege principles, and continuous verification – regardless of inside or outside boundaries. This approach offers significant benefits for securing operational technology (OT) environments and critical infrastructure.
However, practical implementation of zero trust in OT poses unique challenges that must be addressed:
- Legacy OT systems often lack necessary security controls for zero trust implementation
- Continuous verification measures like multi-factor authentication can impact safety-critical operations
- Limited vendor support makes comprehensive zero trust difficult across diverse OT environments
Together with Dragos, Rockwell Automation underwrote this fireside dinner discussing Zero Trust as it applies to industrial environments. Throughout this video series, industry-leading experts will answer the hottest questions around Zero Trust, such as where and how to start when implementing a Zero Trust strategy in OT environments, what steps to take to make your Zero Trust approach successful, what technology must be in place to support a zero trust initiative, and more.