{"id":40246,"date":"2021-10-26T11:04:24","date_gmt":"2021-10-26T03:04:24","guid":{"rendered":"https:\/\/version-2.com\/?p=40246"},"modified":"2022-08-18T10:43:23","modified_gmt":"2022-08-18T02:43:23","slug":"implementing-zero-trust-security-in-ot-environments","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/10\/implementing-zero-trust-security-in-ot-environments\/","title":{"rendered":"Implementing Zero Trust Security in OT Environments"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"40246\" class=\"elementor elementor-40246\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\"><div class=\"elementor-widget-wrap\"><div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\" width=\"757\" height=\"379\" \/><p><span style=\"color: #211f22;\">In 2021, the increasing number of cyber security attacks on major critical infrastructure operators grabbed the headlines. The successful attacks targeted different industrial sectors such as <\/span><a href=\"\/en\/colonial-pipeline-attack-spells-fuel-pipeline-shutdown-and-highlights-the-need-for-increased-ot-security\/\" target=\"_blank\" rel=\"noopener\">oil pipelines<\/a><span style=\"color: #211f22;\">, <\/span><a href=\"\/en\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\/\" target=\"_blank\" rel=\"noopener\">food manufacturers<\/a><span style=\"color: #211f22;\">, and <\/span><a href=\"\/en\/takeaways-from-the-oldsmar-water-attack-what-security-leaders-can-do-about-it\/\" target=\"_blank\" rel=\"noopener\">water and wastewater facilities<\/a><span style=\"color: #211f22;\">. Up until these attacks occurred, the media and the industrial sectors paid little attention to the cybersecurity of critical infrastructure.\u00a0<\/span><\/p><div id=\"more-40413\">\u00a0<\/div><p><span style=\"color: #081f2d;\">Now that organizations and analysts are increasing their awareness of the different risks and vulnerabilities with critical infrastructure and OT environments, it is becoming more visible and how impactful these risks have on our daily lives. The recent increase of attacks on the different industrial sectors is finally receiving attention including at the highest levels of several governments.\u00a0<\/span><\/p><p><span style=\"color: #081f2d;\">In May 2021, the President of the United States Joe Biden issued an <\/span><a href=\"\/en\/five-key-takeaways-from-the-u.s.-executive-order-to-bolster-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Executive Order on improving the nation\u2019s cybersecurity<\/a><span style=\"color: #081f2d;\"> with a clear focus on critical infrastructure. As stated, \u201cThe scope of protection and security must include systems that process data (information technology (IT) and those that run the vital machinery that ensures our safety (operational technology (OT).\u201d<\/span><\/p><p><span style=\"color: #081f2d;\">While this is a great first step into advancing OT security, it is simply not enough. <\/span><span style=\"color: #081f2d;\">The different risks are due to three key factors. First, more critical infrastructure operators are digitalizing their equipment and environments which is resulting in their organizations becoming more vulnerable to cyber attacks. Second, the trend of <\/span><a href=\"\/en\/it\/ot-convergence-how-two-worlds-can-converge-properly-in-industrial-iot\/\" target=\"_blank\" rel=\"noopener\">converging IT and OT<\/a><span style=\"color: #081f2d;\"> to be more interconnected has resulted in IT exploitation which is affecting OT environments. Last but not least, cyber criminals and nation-state attackers are attacking more aggressively by adopting more sophisticated tactics to exploit industrial control systems (ICS).<\/span><\/p><p><strong><span style=\"color: #211f22;\">The Growing OT Attack Surface\u00a0<\/span><\/strong><\/p><p><span style=\"color: #211f22;\">As operational technology (OT) networks are becoming increasingly connected to an organization\u2019s network infrastructure, older strategies such as \u2018air gapping\u2019 are no longer relevant or feasible.\u00a0<\/span><\/p><p><span style=\"color: #211f22;\">Many organizations think IT security best practices are the answer and will search for IT security solutions that could possibly integrate with their OT environments.\u00a0 This is the wrong approach to gain visibility and threat detection into OT networks. OT networks need a specifically designed solution that can detect security risks to avoid the exploitation of critical infrastructure. By deploying the wrong kind of solution within an OT environment it can result in different problems occurring to the OT network such as downtime and false-positive alerts and more.\u00a0<\/span><\/p><p><span style=\"color: #211f22;\">Instead, organizations should deploy OT security solutions that are designed and integrated with Zero Trust capabilities. This is the idea of limiting access to users, devices and equipment without the proper identification and permissions. So how does the Zero Trust model relate to OT networks?\u00a0\u00a0<\/span><\/p><p><strong><span style=\"color: #211f22;\">Zero Trust For OT Networks<\/span><\/strong><\/p><p><strong><span style=\"color: #211f22;\"><img decoding=\"async\" style=\"width: 984px;\" src=\"https:\/\/i2.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?w=984&amp;ssl=1\" sizes=\"(max-width: 984px) 100vw, 984px\" srcset=\"https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?width=492&amp;name=SCADAfence%20Zero%20Trust.png 492w, https:\/\/i2.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?w=984&amp;ssl=1 984w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?width=1476&amp;name=SCADAfence%20Zero%20Trust.png 1476w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?width=1968&amp;name=SCADAfence%20Zero%20Trust.png 1968w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?width=2460&amp;name=SCADAfence%20Zero%20Trust.png 2460w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust.png?width=2952&amp;name=SCADAfence%20Zero%20Trust.png 2952w\" alt=\"SCADAfence Zero Trust\" width=\"757\" height=\"427\" \/><\/span><\/strong><\/p><h2 style=\"font-size: 14px; font-weight: normal;\">Diagram 01: The SCADAfence Einstein Baseline\u2019s Sensitivity Dashboard\u00a0<\/h2><p><span style=\"color: #000000;\">The Zero Trust motto is \u201cnever trust, always verify\u201d and this is especially true when creating security controls in OT networks and devices.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">Many OT devices and systems are still using un-encrypted and unauthenticated protocols. However, it\u2019s not just the devices. Too often, OT teams are not open to the idea of connecting their once-isolated systems or PLCs to the Internet, despite those systems being implemented with encryption and authentication. As more IT and OT systems are opening their gates to connect to the Internet, the need to adopt the principle of less privilege is more aligned with the expanding threat landscape.<\/span><\/p><p><span style=\"color: #000000;\">Organizations need to look at OT security solutions that can provide policy-based access for authorized users. This is the approach that only OT teams or other specific users should have access to OT environments. Simply put, only employees who need access to OT networks and devices to do their day-to-day job should have access.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">Enforcing access controls early on, which is based on the principle that no one should be able to connect unless authorized, will allow security teams to provide access once authorized. Each user and device access request needs to be verified and then, only if verified, the access will be granted to the authorized users.\u00a0\u00a0\u00a0<\/span><\/p><p><span style=\"color: #000000;\">By implementing the Zero Trust security model with granular access authorization, it can guarantee organizations that the proper access is being granted in OT environments with an additional level of security. By restricting who has access to what network or device, the Zero Trust model will help minimize the attack surface of the increasing risks within an OT environment.\u00a0\u00a0<\/span><\/p><p><span style=\"color: #000000;\">Additionally enforcing MFA (multi-factor authentication) is another essential Zero Trust model capability for OT leaders to implement with role-based access. With MFA, access is only granted after successfully presenting two or more pieces of evidence, or factors, to an authentication mechanism. These factors will provide an additional layer of security against unauthorized access for OT environments.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">While the task to integrate the basic Zero Trust framework is not a simple task across complex environments like OT networks, rethinking a security approach with the Zero Trust framework is the right step in protecting critical infrastructure and OT environments.\u00a0<\/span><\/p><p><strong><span style=\"color: #211f22;\">SCADAfence Offers Zero Trust Capabilities for OT Environments\u00a0<\/span><\/strong><\/p><p><strong><span style=\"color: #211f22;\"><img decoding=\"async\" style=\"width: 1870px;\" src=\"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?w=1870&amp;ssl=1\" sizes=\"(max-width: 1870px) 100vw, 1870px\" srcset=\"https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?width=935&amp;name=SCADAfence%20Zero%20Trust%20Dashboard.png 935w, https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?w=1870&amp;ssl=1 1870w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?width=2805&amp;name=SCADAfence%20Zero%20Trust%20Dashboard.png 2805w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?width=3740&amp;name=SCADAfence%20Zero%20Trust%20Dashboard.png 3740w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?width=4675&amp;name=SCADAfence%20Zero%20Trust%20Dashboard.png 4675w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/SCADAfence%20Zero%20Trust%20Dashboard.png?width=5610&amp;name=SCADAfence%20Zero%20Trust%20Dashboard.png 5610w\" alt=\"SCADAfence Zero Trust Dashboard\" width=\"757\" height=\"425\" \/><\/span><\/strong><\/p><h2 style=\"font-size: 14px;\">Diagram 02:\u00a0 The SCADAfence Einstein Baseline\u2019s Unique Zero Trust Capabilities<\/h2><p><span style=\"color: #000000;\">SCADAfence is the only OT security vendor offering an OT network security solution that integrates with the Zero Trust model for industrial environments. The SCADAfence Platform enables users to define access-group segmentation and to enforce Zero Trust capabilities in their OT networks. Users can gain full visibility of their production networks which are designed and supported by the Zero Trust security framework.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">With the industry-leading Einstein baseline, the SCADAfence Platform learns an entire industrial network in less than 2 days. This includes learning all traffic patterns, asset behavior and network subnets. The Platform is able to immediately send alerts on any anomalies or deviations from the normal network behavior.<\/span><\/p><p><span style=\"color: #000000;\">When the Zero-Trust model is enabled in the Einstein baseline period, the Platform not only displays and alerts users of all the activities and devices on the network, but all network behaviors are treated as potentially malicious until further verified.<\/span><\/p><p><span style=\"color: #000000;\">As we continue to advance our leading OT security platform with more security features and capabilities, SCADAfence users continuously have more flexibility to manage their OT environments. Our latest integration of Zero Trust capabilities, will guide users with an additional level of security from the baseline stage to the ongoing security management stage and onward.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">To learn more about SCADAfence\u2019s Zero Trust capabilities for OT networks, schedule a demo with one of our experts here:<\/span> <a style=\"color: #007bff;\" href=\"https:\/\/l.scadafence.com\/demo\" target=\"_blank\" rel=\"noopener\">https:\/\/l.scadafence.com\/demo<\/a><\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5987d9c elementor-widget elementor-widget-shortcode\" data-id=\"5987d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18130\" class=\"elementor elementor-18130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About SCADAfence<\/strong><br \/>SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT\/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world\u2019s most complex OT networks, including Europe\u2019s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In 2021, the increasing number of cyber security attack [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,417,61],"tags":[418,462],"class_list":["post-40246","post","type-post","status-publish","format-standard","hentry","category-year2021","category-scadafence","category-press-release","tag-scadafence","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementing Zero Trust Security in OT Environments - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing Zero Trust Security in OT Environments - Version 2\" \/>\n<meta property=\"og:description\" content=\"In 2021, the increasing number of cyber security attack [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T03:04:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T02:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/implementing-zero-trust-security-in-ot-environments\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Implementing Zero Trust Security in OT Environments\",\"datePublished\":\"2021-10-26T03:04:24+00:00\",\"dateModified\":\"2022-08-18T02:43:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/implementing-zero-trust-security-in-ot-environments\\\/\"},\"wordCount\":1067,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i2.wp.com\\\/blog.scadafence.com\\\/hubfs\\\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\",\"keywords\":[\"SCADAfence\",\"2021\"],\"articleSection\":[\"2021\",\"SCADAfence\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/implementing-zero-trust-security-in-ot-environments\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments\",\"name\":\"Implementing Zero Trust Security in OT Environments - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i2.wp.com\\\/blog.scadafence.com\\\/hubfs\\\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\",\"datePublished\":\"2021-10-26T03:04:24+00:00\",\"dateModified\":\"2022-08-18T02:43:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#primaryimage\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/blog.scadafence.com\\\/hubfs\\\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/blog.scadafence.com\\\/hubfs\\\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/implementing-zero-trust-security-in-ot-environments#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing Zero Trust Security in OT Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing Zero Trust Security in OT Environments - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments","og_locale":"en_US","og_type":"article","og_title":"Implementing Zero Trust Security in OT Environments - Version 2","og_description":"In 2021, the increasing number of cyber security attack [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments","og_site_name":"Version 2","article_published_time":"2021-10-26T03:04:24+00:00","article_modified_time":"2022-08-18T02:43:23+00:00","og_image":[{"url":"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/10\/implementing-zero-trust-security-in-ot-environments\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Implementing Zero Trust Security in OT Environments","datePublished":"2021-10-26T03:04:24+00:00","dateModified":"2022-08-18T02:43:23+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/10\/implementing-zero-trust-security-in-ot-environments\/"},"wordCount":1067,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#primaryimage"},"thumbnailUrl":"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1","keywords":["SCADAfence","2021"],"articleSection":["2021","SCADAfence","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/10\/implementing-zero-trust-security-in-ot-environments\/","url":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments","name":"Implementing Zero Trust Security in OT Environments - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#primaryimage"},"thumbnailUrl":"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1","datePublished":"2021-10-26T03:04:24+00:00","dateModified":"2022-08-18T02:43:23+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#primaryimage","url":"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1","contentUrl":"https:\/\/i2.wp.com\/blog.scadafence.com\/hubfs\/Zero%20Trust%20Blog.png?resize=1024%2C512&amp;ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/implementing-zero-trust-security-in-ot-environments#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Implementing Zero Trust Security in OT Environments"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-at8","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/40246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=40246"}],"version-history":[{"count":19,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/40246\/revisions"}],"predecessor-version":[{"id":55340,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/40246\/revisions\/55340"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=40246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=40246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=40246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}