# CISA Urges Zero Trust Architecture for Operational Technology as IT-OT Convergence Creates Critical Security Gap
## The Threat
Operational technology systems—the industrial controllers, SCADA networks, and physical infrastructure that power manufacturing, energy, water treatment, and critical infrastructure—have historically relied on air-gapped networks and implicit trust models for security. But that isolation is rapidly disappearing. As organizations digitize OT environments with remote monitoring, cloud connectivity, and IT-OT integration, they're inadvertently exposing critical physical systems to cyberattacks designed for IT networks.
CISA, in coordination with the Departments of Defense, Energy, State, and the FBI, has released comprehensive guidance warning that traditional perimeter-based defenses are no longer adequate for protecting OT systems. The joint advisory, *Adapting Zero Trust Principles to Operational Technology*, makes clear that the convergence of IT and OT infrastructure is introducing cybersecurity risks that legacy security models cannot address.
The core problem: OT systems that were once isolated or manually operated are now increasingly interconnected, digitally monitored, and remotely controlled—yet they often run on decades-old hardware and software that was never designed with networked security in mind. This creates a uniquely dangerous gap where organizations must protect critical physical processes (manufacturing lines, power grids, water systems) with technologies designed for both modern infrastructure and legacy systems that cannot easily be patched or replaced.
## Severity and Impact
| Aspect | Details |
|--------|---------|
| Threat Type | Architectural guidance for operational technology security |
| Risk Category | IT-OT convergence, legacy infrastructure exposure, supply chain vulnerabilities |
| Scope | All critical infrastructure sectors (energy, water, manufacturing, transportation) |
| Primary Concern | Inadequate perimeter defenses and implicit trust models in digitized OT environments |
| Key Gaps Identified | Asset visibility, supply chain risk management, identity/access controls, network segmentation |
| Attack Surface | Remote access points, cloud connectivity, integrated IT systems, third-party vendors |
| Guidance Authority | CISA (Cybersecurity & Infrastructure Security Agency) with FBI, DoD, DoE, State Department |
## Affected Products
This guidance applies across all operational technology environments, including:
Energy Sector
Water and Wastewater
Manufacturing
Transportation
Healthcare
Telecommunications
The guidance is agnostic to specific vendors and applies to both legacy OT platforms and modern industrial IoT systems from all manufacturers.
## Mitigations
CISA's guidance recommends a phased approach to implementing zero trust principles in OT environments, accounting for the unique constraints of operational technology:
1. Establish Comprehensive Asset Visibility
Organizations must first inventory and map all OT assets, including legacy systems, networked devices, and their interdependencies. This foundational step enables threat detection, vulnerability management, and segmentation strategies. Many organizations lack basic visibility into what's connected to their OT networks—a prerequisite for any security improvement.
2. Address Supply Chain Risks Proactively
OT systems depend heavily on third-party vendors, integrators, and components. Zero trust in OT requires:
3. Implement Robust Identity and Access Management
Rather than trusting any user or system within the OT network:
4. Deploy Layered Security Measures
A zero trust OT architecture requires multiple overlapping defenses:
5. Account for Operational Constraints
Unlike IT systems, OT infrastructure cannot always be taken offline for patching or updates. The guidance emphasizes:
6. Plan for Gradual Transition
Zero trust cannot be implemented overnight in legacy OT environments. Organizations should:
## References
Official CISA Guidance:
Supporting Resources:
---
## The Bottom Line
The shift toward zero trust in operational technology isn't optional—it's essential. As critical infrastructure becomes increasingly digital and connected, organizations that continue relying on air-gap isolation and implicit trust are building security on assumptions that no longer hold. CISA's joint guidance provides a roadmap, but implementation requires sustained investment in asset visibility, vendor management, access controls, and layered defenses.
For OT owners and operators, the path forward is clear: assess your current state, prioritize the highest-risk systems and connections, and begin implementing zero trust principles now. The physical systems you protect—and the communities that depend on them—are worth the effort.