Notifications
Clear all
Technology and solutions
1
Posts
1
Users
0
Reactions
351
Views
Topic starter
09/03/2022 8:23 am
Roping in zero-trust architecture to secure federal agencies from malicious cyber campaigns
“By now, most folks are familiar with the slogan ‘never trust, always verify’ but what does it really mean to an industrial enterprise? Is the IEC 62443 architecture of zones and conduits considered zero-trust? While it does not deal with identity, granular access, or separation of control/data – some could see it a step towards zero-trust micro-segmentation,” according to Gordon. “So, it is likely that definitions and implementation plans will differ considerably,”
What's your take on the role/place of zero trust in the OT environment?