New security dimension 
for IT and OT

Zero Trust is an IT security model in which the default position is not to trust any IT entity at first. Every user, every device, and every network transaction is considered potentially hazardous and has to be checked, regardless of where it is (inside or outside your network). But Zero Trust is not a firmly defined or regularized industry standard, so the way it works varies from one environment to another.

Zero Trust is a paradigm shift in the way security is understood. It no longer gives known access rights by default. It blocks access by default unless explicitly required. Zero Trust isn’t just used in conjunction with IT resources, most of which are now pretty secure. It’s used also in the context of complex industrial facilities and entire OT landscapes. These industrial facilities involve a wide range of devices, services, and applications, which produce a large number of events, interactions, and data points.

On top of this, there are an increasing number of entities accessing production networks (OT) via IP networks from all sorts of locations, which means greater risks and more stringent security requirements. This is because of the spread of cloud services, but also because more people are working from home, and because the Industrial Internet of Things (IIoT) is producing more data points. Zero Trust is a complete, proactive approach to these cybersecurity challenges which views trust as an ongoing process and isn’t satisfied with one-time checking.

Certain basic rules and 
principles for Zero Trust

Micro-segmentation

Micro-segmentation divides networks up into the smallest and most isolated segments possible, with the aim of isolating threats within the network. 

Least privilege access

Least privilege access gives users and devices only the minimum permissions they need to do their work. This also limits the extent of potential damage in the event that a user account is compromised. 

Multifactor authentication

Multifactor authentication, which uses multiple factors to confirm a user's identity, further reduces the likelihood of attackers gaining access to resources.

Implementation 
and Challenges

Implementing a Zero Trust strategy in operational technology (OT) can be complex and often requires a fundamental rethink of corporate culture so that people begin to accept the need to constantly assess and limit access rights. After all, blocking data traffic within a production facility can impair ongoing processes just as much as permitting it.

Implementation can take place in several stages. Plant operators can start at the 1) IT/OT boundary, continue with the 2) lower levels of OT, and then secure the extended 3) OT infrastructure in public clouds, 5G networks, and Secure Access Service Edge (SASE) connections.

Despite this, Zero Trust is an important tool at the disposal of modern IT and OT security teams, giving them a robust way of defending against numerous different threats in increasingly digitalized and networked industrial facilities. AMDT can assist businesses in answering key questions by providing suitable software solutions that produce lasting effective security concepts.

Dive Deeper

cyberattack production cyberattack production
On Demand Webcast

Cybersecurity - Is your OT environment secure?

Discover in our video why traditional IT defenses don't suffice for OT, and the proactive measures needed to secure your manufacturing plant against costly cyber threats.

Watch video
Cybersecurity production Cybersecurity production
White paper

Keeping Cybersecurity Risks Under Control

Protect your OT from costly cyberattacks and ransomware - learn key strategies for proactive defense in this white paper.

Download white paper