Page 28 - Cyber Defense eMagazine April 2023
P. 28

OT Zero Trust


            The Last Frontier to Protect OT Environments

            By Terence Liu, CEO of TXOne Networks






            OT Zero Trust – a Device-Centric Methodology


            In  the  IT  world,  the  heart  of  Zero  Trust  is  continuous verification, ensuring  that every  point  of  entry
            between connected services is from an authorized identity, at the proper time, from the expected source,
            through registered devices. This is a very human-centric and contextual process. Due to a high level of
            interaction between people through various services, any compromised personnel can pose threats to
            the entire organization.

            In the OT world, devices and equipment are seldom bound to specific personnel. Despite its similarities
            in  damage  propagation  to  the  IT  world,  OT  countermeasures  are  totally  different.  Here  at  TXOne
            Networks, we advocate OT Zero Trust methodology, which is also a process of continuous verification.
            However, it is a device-centric, rather than people-centric, approach that covers all stages in the asset
            lifecycle. Every piece of equipment should be inspected before being sent to the production line, and all
            equipment should be continuously monitored and protected while in the process of manufacturing. IT
            people can easily sacrifice a portion of service availability for a boost in security during a given period.






































                                                                                                              28
   23   24   25   26   27   28   29   30   31   32   33