BusinessCybersecurityNewswireTechnology

CISA and Partners Release Zero Trust Guidance for OT Security

Originally published on: May 1, 2026
▼ Summary

– A new joint guide from US government agencies, led by CISA, details how to apply zero-trust principles in operational technology environments to secure critical infrastructure.
– The guide addresses the complexity of introducing zero trust into OT, noting that traditional IT approaches cannot be directly applied due to legacy systems and strict availability requirements.
– It highlights increased risks from IT-OT convergence, where adversaries exploit weak segmentation and compromised credentials to disrupt physical processes using malware like CrashOverride.
– Key recommendations include establishing asset inventories, enforcing network microsegmentation, implementing identity controls adapted to legacy systems, and securing remote access with MFA.
– The guidance emphasizes balancing security with operational constraints, recommending compensating controls like enhanced monitoring and aligning cyber incident response with existing safety procedures.

A new cross-government guide has been released to help organizations apply zero-trust security principles to operational technology (OT) environments. Developed by the Cybersecurity and Infrastructure Security Agency (CISA) and federal partners, the document provides actionable steps to protect critical infrastructure without compromising safety or uptime.

Titled Adapting Zero Trust Principles to Operational Technology, the publication is the result of a multi-agency working group. It targets security practitioners and OT operators who must navigate the unique challenges of introducing zero-trust architectures into systems built for continuous operation and physical safety.

The guide stresses that IT-centric zero-trust models cannot be directly applied to OT. Legacy systems, limited visibility, and strict availability requirements demand a tailored approach.

Managing IT-OT Convergence Risks

As industrial systems become more interconnected, the attack surface widens. Threat actors now exploit weak segmentation, stolen credentials, and supply chain flaws to move from IT into OT networks. Malware like CrashOverride and BlackEnergy has shown the ability to disrupt physical processes, while living-off-the-land (LOTL) techniques let attackers blend into normal operations.

These evolving threats render perimeter-based defenses obsolete. The guide advocates for a zero-trust model that assumes compromise and continuously verifies every access request.

OT incidents carry real-world consequences, including service disruption, equipment damage, and safety hazards. Risk assessments must weigh both digital and physical impacts when prioritizing defenses.

Core Zero-Trust Principles for OT

Instead of one-size-fits-all solutions, the guide recommends a layered, context-aware approach. Key recommendations include:

  • Building comprehensive asset inventories through passive monitoringCollaboration between IT, OT, and security teams is essential to balance protection with operational continuity.

Navigating Operational Constraints

Applying zero trust in OT introduces practical hurdles. Limited patching windows, minimal logging, and long equipment lifecycles complicate deployment. The guide recommends compensating controls such as enhanced monitoring and strict access policies where modern security features cannot be used.

Incident response planning and recovery processes are central to the strategy. Organizations should align cyber response with existing safety procedures and business continuity plans to minimize disruption during attacks.

The agencies conclude that zero-trust adoption in OT is not about eliminating all risk. It is about improving resilience through informed, context-aware decisions that respect the unique demands of operational technology.

(Source: Infosecurity Magazine)

Topics

zero trust ot 95% critical infrastructure 90% it ot convergence 88% safety requirements 87% cyber attack vectors 85% network segmentation 83% Legacy Systems 82% incident response 81% access controls 80% risk assessment 79%