What is Zero Trust Architecture (ZTA)?

Zero Trust Architecture (ZTA) is a security model in which no user, application or device is automatically trusted, regardless of whether it is inside or outside the network. Access is only granted after thorough verification and continuous assessment.

In OT, Zero Trust means that access to systems such as SCADA, PLCs or Engineering Stations must be constantly checked, logged and limited — even within your own perimeter.


🧠 Core principles of Zero Trust

  1. Never trust, always verify – Every action requires explicit authentication and authorisation
  2. Least privilege access – Access is restricted to what is strictly necessary
  3. Microsegmentation – Networks are divided into small, secure zones
  4. Continuous validation – Identity, device posture and behaviour are continuously monitored
  5. Identity-driven policy – Access is based on who or what you are, not where you are

🔐 Zero Trust in OT environments

Principle Application in industrial systems
Strong authentication Access to SCADA and HMI requires password + MFA
Jump Server External access only via controlled access paths
Microsegmentation OT network split per function or risk profile
Monitoring and logging Every action by users or systems is recorded
Temporary rights Technicians only get temporary access to systems

Zero Trust is particularly important for remote access, supply chain integrations and segmentation of mixed IT/OT networks.


✅ Key components of ZTA

Component Function
Identity & Access Management Management of users, roles and authentication
Device Trust & Inventory Verifying that devices are trusted and up to date
Anomaly detection Recognising abnormal behaviour or unusual network activity
Logging & auditing Full overview of who does what and when
Policy and authorisation Access based on context: location, time, role, device status

🔁 Relationship with standards

Standard Relevance to Zero Trust
NIST SP 800-207 Reference model for Zero Trust Architecture
IEC 62443-3-3 Requirements regarding access, detection, segmentation in industrial networks
ISO 27001 Identity management, access control, logging and policy
NIS2 Mandatory measures regarding access management and network security

📦 IT vs. OT in Zero Trust

IT (classic ZTA) OT application of ZTA
VPN with device posture checks Jump Server with identity verification for field access
MFA for web applications MFA for SCADA/HMI remote access
Microsegmentation in data centres Segmentation of OT per function (SCADA, Historian, PLC)
Real-time user behaviour analytics OT anomaly detection with protocol awareness (e.g. Modbus)

Zero Trust in OT calls for tailoring: restrictions must not disrupt production processes, but must still mitigate risk.


📌 In summary

Zero Trust Architecture is a modern security principle that assumes no entity is trusted without verification. In OT environments, ZTA helps to limit external access, lateral movement, insider threats and misconfigurations through segmentation, access restrictions and continuous monitoring.