Skip to content
Cybersecurity | | | 24 min read

Zero Trust Architecture - from concept to implementation in IT and OT environments

Zero Trust Architecture - 7 NIST 800-207 principles, CISA ZTMM v2.0 maturity model, microsegmentation and implementation roadmap for IT and OT.

Józef Sulwiński Józef Sulwiński
zero trustNIST 800-207ZTNAmicrosegmentationSASEIEC 62443
Zero Trust Architecture - from concept to implementation in IT and OT environments
)}

In December 2020, SolarWinds disclosed that an update to the Orion platform contained a backdoor installed by an APT group linked to Russian intelligence. The SUNBURST malware operated within the networks of over 18,000 organizations - including US government agencies, technology companies, and critical infrastructure operators. Firewalls, IDS systems, and VPNs were of no help because the attackers were already inside, moving laterally between systems with the privileges of trusted software.

This incident confirmed what John Kindervag described in 2010 and what NIST formalized in SP 800-207 in 2020: the security model based on network perimeters is fundamentally flawed. Not because firewalls don’t work - but because they assume something that cannot be guaranteed: that everything inside the network is trustworthy.

In this article, we break down Zero Trust Architecture into its component parts - from the seven NIST principles, through the CISA maturity model, to specific implementation challenges in OT environments where protocols like Modbus and PROFINET do not support authentication.

63%

of organizations worldwide have implemented a Zero Trust strategy (2024)

10%

of large enterprises will have a mature ZT program by 2026

105

ZT activities for OT defined by DoD (2025)

70%

of new remote access deployments based on ZTNA instead of VPN

Source: Gartner (2024), DoD CIO (2025)

What is Zero Trust Architecture

Zero Trust is not a product or technology - it is a security model that eliminates implicit trust from network architecture. Every access - regardless of whether it originates from inside or outside the network - must be authenticated, authorized, and continuously validated.

NIST SP 800-207 defines ZTA architecture across two planes: control plane and data plane. This separation is fundamental - access decisions are made in a different layer than the actual data flow.

Control Plane - the brain of the architecture

The control plane consists of three logical components that collaborate on every access request:

Policy Engine (PE) - the brain of the system. It receives an access request and makes a decision (grant/deny/revoke) based on a trust algorithm - an algorithm that weighs multiple signals simultaneously:

Signal sourceExampleImpact on decision
User identityMFA confirmed, account active, roleWho is requesting access?
Device postureEDR active, OS current, disk encryptedIs the device trustworthy?
Location and contextIP, geolocation, time of day, networkIs the context normal?
BehaviorAnomalies vs baseline (e.g., impossible travel)Is the behavior suspicious?
Threat intelligenceKnown malicious IPs, IOCs, active campaignsIs the environment safe?
Organization policiesAccess rules per resource, data classificationWhat is allowed and what is not?

Policy Administrator (PA) - the translator. It receives the PE’s decision and configures enforcement mechanisms: generates session tokens, defines connection parameters (IP, port, key), opens or closes the communication channel.

Policy Enforcement Point (PEP) - the guard on the data plane. It physically blocks or allows traffic. The PEP is the only component that “touches” data - it can be an agent on a device, a network gateway, a reverse proxy, or a firewall.

Data Plane - the data flow

The data plane is the plane where actual communication between the user/device and the resource takes place. The PEP operates at the boundary of the data plane - allowing only traffic authorized by the control plane.

How an access request works - step by step

User/device → PEP [blocks by default]

                    PA (forwards request to PE)

                    PE [trust algorithm]:
                    ├── Check identity (IdP/MFA)
                    ├── Check device posture (EDR/MDM)
                    ├── Check context (location, time, network)
                    ├── Check threat intelligence
                    ├── Check access policies
                    └── Calculate risk score

                    Decision: GRANT (risk score < threshold)

                    PA → configures PEP (open channel, session X, timeout Y)

                    PEP [allows] → Resource

                    [Continuous validation - PE monitors session]
                    If risk score increases → PA → PEP [terminate session]

WARNING

The trust algorithm is not binary (yes/no) - it is a continuous risk assessment (risk score). A session can be: (1) granted with full access, (2) granted with limited access (e.g., read-only), (3) granted but requiring step-up authentication (additional MFA), (4) blocked. The score is recalculated cyclically - Microsoft Entra checks device posture every 15 minutes.

Control mechanisms implemented by ZTA components

Each component implements specific control mechanisms:

ComponentControl mechanismHow it works
PEContinuous authenticationIdentity verification not only at login, but throughout the entire session
PERisk-based accessDecision depends on context, not just password and role
PEAdaptive policiesDifferent requirements for the same resource depending on risk (e.g., office vs cafe)
PASession bindingSession tied to a specific device and identity - token cannot be transferred
PAJust-in-time accessPrivileges granted for the duration of a task, automatically expire
PEPDefault denyEvery connection blocked by default until PE issues a decision
PEPMicrosegmentationGranular policies per workload/device/protocol
PEPProtocol-aware filteringIn OT: allow Modbus Read, block Modbus Write from unauthorized sources

In practice, PE, PA, and PEP can be implemented as separate systems (e.g., SIEM/SOAR as PE, NAC as PA, firewall as PEP) or as an integrated platform (SASE/SSE, Microsoft Entra + Defender + Intune).

Seven principles of NIST SP 800-207

NIST formulated seven fundamental principles on which every Zero Trust implementation is based:

#PrinciplePractical implication
1All data sources and computing services are resourcesNot just servers - also printers, IP cameras, PLC controllers, IoT sensors
2All communication is secured regardless of network locationTraffic within the corporate network requires the same encryption as traffic from the internet
3Access to resources is granted on a per-session basisEach connection requires separate authorization - no permanent “trusted” tunnels
4Access is determined by dynamic policyDecision considers identity, device state, location, time of day, behavior
5The organization monitors the integrity and security posture of all assetsContinuous diagnostics, not a one-time audit - CDM (Continuous Diagnostics and Mitigation)
6Authentication and authorization are dynamic and strictly enforcedMFA at login is not enough - validation continues throughout the session
7The organization collects maximum information about the state of assets and communicationTelemetry from networks, endpoints, applications, and identity feeds the decision model

Three NIST deployment models

NIST describes three reference deployment models that differ in how the PEP is implemented:

Agent model (Device Agent/Gateway) - agent software on each device works with a resource gateway. Best control granularity, but requires the ability to install an agent - which in OT environments can be impossible.

Enclave Gateway model - protects groups of related resources behind a shared gateway. Equivalent to the zones and conduits concept from IEC 62443 - fits well with OT network segmentation.

Resource Portal model - a single access point for multiple resources, acting as a reverse proxy. Used in remote access to ICS systems scenarios, where service technicians connect through a central gateway.

TIP

In OT environments, the enclave model is the most commonly used starting point. It allows Zero Trust control over groups of devices that do not support authentication themselves (e.g., PLC controllers communicating via Modbus TCP), without the need to install agents on process devices.

CISA Zero Trust Maturity Model v2.0

In April 2023, CISA published the updated Zero Trust Maturity Model (ZTMM v2.0), which defines five pillars and four maturity levels. This model is mandatory for US federal agencies (OMB M-22-09), but serves as a practical roadmap for any organization.

Five pillars and four levels

PillarTraditionalInitialAdvancedOptimal
IdentityPasswords, local accountsMFA, central IdPContinuous verification, session risk analysisPhishing-resistant MFA, just-in-time access, full automation
DevicesNo inventoryBasic MDM, antivirusEDR/XDR, compliance check before accessContinuous posture validation, real-time isolation of compromised devices
NetworksFlat network, perimeter firewallIT/OT macrosegmentationMicrosegmentation, east-west encryptionDynamic segmentation, adaptive policies based on behavior
ApplicationsNo inventory, no testingBasic vulnerability scanningDAST/SAST in CI/CD, WAFContinuous testing, runtime protection, service mesh with mTLS
DataNo classificationBasic classification, perimeter DLPAutomatic classification, encryption at-rest and in-transitRights management (DRM), real-time access audit, tokenization

Three cross-cutting capabilities

In addition to the five pillars, CISA defines three capabilities that span every pillar:

  1. Visibility and analytics - telemetry from every pillar feeds a shared decision model (SIEM/SOAR/XDR)
  2. Automation and orchestration - policies enforced automatically, without manual intervention
  3. Governance - policies, procedures, roles, and responsibilities defined and measured

NOTE

Most organizations in Europe are at the Traditional or Initial level. Progressing to Advanced typically requires 18-24 months and involves deploying centralized identity management, microsegmentation, and continuous endpoint monitoring. You don’t need to address all five pillars simultaneously - CISA recommends starting with the identity pillar, as it forms the foundation of every access decision.

Zero Trust in OT environments - specifics and challenges

Zero Trust principles were created in the context of IT environments, where every device has an operating system capable of running an agent, and communication protocols support encryption and authentication. OT environments are a different world.

Why OT is harder

ChallengeDescriptionImpact on Zero Trust
No authentication in protocolsModbus, S7comm, EtherNet/IP have no auth mechanismsCannot verify identity at the protocol level
15-25 year lifecyclePLC controllers, RTUs, DCS operate for decades without updatesNo ability to install agents, no TLS support
Real-time requirementsDelays >10ms can cause process failuresInline inspection and encryption can disrupt determinism
No agentsMany Level 0-1 devices lack computational resources for an agentForces network-centric rather than agent-based approach
Availability > confidentialityPriority: the process must run, even at the cost of securityZT mechanisms cannot block critical communication

DoD Zero Trust for OT (November 2025)

In November 2025, the Pentagon published the first comprehensive guide for implementing Zero Trust in OT environments - “Zero Trust for Operational Technology Activities and Outcomes.” The document defines:

  • 105 ZT activities divided across 7 pillars (users, devices, applications & workloads, data, networks & environments, automation & orchestration, visibility & analytics)
  • 84 target level activities - minimum required from every DoD component
  • 21 advanced level activities - for systems with the highest risk level

Key DoD requirement: the Purdue model, IEC 62443, and UFC 4-010-06 remain authoritative frameworks for classifying OT systems. Zero Trust is a layer on top, not a replacement - it strengthens control at the zone boundaries that Purdue defines.

Purdue 2.0 - adapting the model to Zero Trust

The classic Purdue model assumes hierarchical segmentation (Level 0-5) with control at level boundaries. Purdue 2.0 preserves this hierarchy but adds:

  • Microsegmentation within levels - not just boundaries between Level 2 (supervision) and Level 1 (control), but granular policies within each level
  • Lateral movement control - restricting east-west communication between devices at the same level
  • Cloud and XIoT integration - IIoT sensors, edge computing gateways, and cloud connections incorporated into the security model
  • Compensating controls for devices without auth - protocol-aware allowlisting, unidirectional gateways, anomaly detection

WARNING

Deploying inline encryption or deep packet inspection in an OT network requires detailed analysis of the impact on process determinism and latency. Always test changes in a laboratory environment with an accurate reproduction of the production topology. In networks with safety communication (SIL 2+), additional delays can violate the timing requirements of the functional safety system.

CISA Microsegmentation Guidance (July 2025)

In July 2025, CISA published the guide “Journey to Zero Trust: Microsegmentation,” which identifies microsegmentation as the foundation of Zero Trust Architecture - including in OT environments. Key recommendations:

  • Start with macrosegmentation (separating IT from OT networks), then move to microsegmentation within the OT zone
  • Segment at the business function level (cell/area zones from IEC 62443), not just VLANs
  • Use protocol-aware enforcement - filtering by protocol function codes, e.g., allowing Modbus Read (FC 03/04) while blocking Write (FC 05/06/16) from unauthorized sources

We describe the detailed approach to segmentation in a separate article: OT network segmentation.

Where Zero Trust doesn’t work - limitations and compensations

ZTA is not a universal solution. There are environments and scenarios where full implementation of Zero Trust principles is impossible or dangerous. The CISO must know where to apply ZTA, where to adapt, and where to compensate with other controls.

Safety Instrumented Systems (SIS)

Safety Instrumented Systems (SIS) - systems performing process safety functions (ESD, F&G, SIL 2+) - have an overriding requirement: they must always work. Adding inline ZTA mechanisms (encryption, per-session authentication) introduces:

  • Latency - additional milliseconds can exceed the timing requirements of safety loops
  • Single point of failure - failure of a ZTA component (e.g., PE unavailable) can prevent safety communication
  • Certification complexity - changes in the SIS communication path require SIL revalidation

Recommendation: SIS should be physically isolated from the ZTA-covered network. Compensating controls: unidirectional gateway (data diode), hardcoded ACL on a dedicated firewall, passive anomaly monitoring (OT NDR in tap mode).

Legacy OT without authentication

PLC controllers and RTUs at Purdue Levels 0-1 (e.g., Modbus RTU, older S7-300) do not support any authentication or encryption mechanisms. You cannot install an agent on a controller with 64 KB of memory.

Recommendation: Enclave Gateway model - the PEP wraps a group of legacy devices, implementing control at the enclave boundary:

ControlHow to implement without an agent
AuthenticationAt the enclave gateway (PEP), not on the end device
AuthorizationProtocol-aware allowlisting: allow specific function codes from specific IPs
MonitoringPassive NDR (Nozomi, Claroty) in tap mode - zero impact on latency
EncryptionIPSec tunnel between enclave gateways, not end-to-end to PLC

Real-time communication and determinism

Protocols with determinism requirements (PROFINET IRT, EtherCAT, Time-Sensitive Networking) do not tolerate additional delays. Inline inspection or per-packet encryption will disrupt the communication cycle.

Recommendation: Do not deploy inline ZTA on the real-time path. Instead: microsegmentation at the switch level (VLAN + ACL), passive monitoring, access control to the management network (not to the real-time network).

Fail-open vs fail-closed

The key question: what happens when the Policy Engine is unavailable?

StrategyWhen to useRisk
Fail-closedIT networks, access to sensitive dataAvailability - users cannot work
Fail-openSafety-critical processes where lack of communication = threat to lifeSecurity - potentially unauthorized access
Cached decisionCompromise - the last known PE decision remains valid for a defined period (e.g., 5 min)Depends on cache TTL and risk change

NOTE

In OT environments, the default strategy should be cached decision with a short TTL - it allows process continuity while limiting the risk window. In IT networks - fail-closed. In safety networks - fail-open with an alert.

Costs and organizational barriers

ZTA requires not just technology but a change in organizational culture. The most common barriers:

  • Inventory - you cannot define policies for assets you don’t know about. Organizations with incomplete inventories must complete them before ZTA deployment
  • User resistance - MFA, access restrictions, device compliance checks. Requires communication and buy-in from management
  • Integration costs - ZTA connects multiple systems (IdP + EDR + NAC + SIEM + firewalls). Integration requires time and expertise
  • Lack of skills - SANS 2025: only 14% of OT organizations feel fully prepared for new threats

Zero Trust technology stack - mapping to pillars

Zero Trust Architecture is not a single tool but an ecosystem of technologies. The table below maps solution categories to CISA ZTMM pillars:

Technology categoryCISA pillarFunction in ZT architecture
IAM / IdP (Entra ID, Okta)IdentityCentral authentication point, SSO, conditional access policies
MFA / phishing-resistant auth (FIDO2, passkeys)IdentityEliminating the credential theft vector
PAM (CyberArk, Delinea)IdentityPrivileged account management, session recording, JIT access
EDR/XDR (CrowdStrike, Microsoft Defender)DevicesContinuous posture validation, threat detection, isolation
MDM/UEM (Intune, Jamf)DevicesCompliance check before access, configuration enforcement
Microsegmentation (Illumio, Guardicore, Zero Networks)NetworksGranular east-west policies, limiting lateral movement
ZTNA (Zscaler Private Access, Cloudflare Access)NetworksReplaces VPN - per-session access, no network exposure
SASE/SSE (Zscaler, Palo Alto Prisma, Netskope)Networks + ApplicationsConsolidation of SWG, CASB, ZTNA, FWaaS into one platform
CASB (Netskope, Microsoft Defender for Cloud Apps)Applications + DataSaaS access control, shadow IT discovery, DLP
DLP / data classification (Purview, Forcepoint)DataAutomatic classification, exfiltration blocking
SIEM/SOAR (Sentinel, Splunk, Chronicle)VisibilityTelemetry correlation, automated incident response
OT NDR (Nozomi, Claroty, Dragos)Networks (OT)Passive OT protocol monitoring, agentless anomaly detection

TIP

Gartner predicts that by 2026, 60% of organizations implementing Zero Trust will use more than one form of microsegmentation (compared with less than 5% in 2023). You don’t need to start with the full stack - but you need to know which categories address which pillars to plan your path from Initial to Advanced.

Advanced detection mechanisms in ZTA architecture

Attackers adapt to ZTA. Session token theft, AiTM (Adversary-in-the-Middle) attacks, and MFA fatigue compromise are techniques for bypassing Zero Trust mechanisms. A mature architecture must account for these vectors.

UEBA - user behavioral analytics

User and Entity Behavior Analytics (UEBA) is a key component of the trust algorithm in the Policy Engine. UEBA builds a profile of normal behavior for each user and device, then assigns a risk score based on deviations:

Behavioral anomalyRisk score impactZTA action
Login at unusual timeLow-mediumStep-up authentication (additional MFA)
Impossible travel (Warsaw → Singapore in 30 min)HighSession block, SOC alert
Massive file download above baselineMedium-highAccess restriction, DLP alert
New device used for privileged accountHighRequire re-authentication + device enrollment
Lateral movement pattern (sequential access to many systems)CriticalImmediate isolation, IR playbook

Defense against token theft and AiTM

AiTM (Adversary-in-the-Middle) attacks intercept session tokens after successful MFA - thereby bypassing authentication. In 2025, this vector became one of the primary methods of account compromise despite MFA.

Compensating controls:

  • Token binding - tying the session token to a specific device (IP, device fingerprint). A token intercepted on another device is rejected
  • Continuous Access Evaluation (CAE) - Microsoft Entra ID allows immediate token revocation (without waiting for TTL expiration) upon detecting anomalies
  • Phishing-resistant MFA - FIDO2/passkeys do not send secrets over the network, so an AiTM proxy has nothing to intercept
  • Compliant Network check - access only from the corporate network or via ZTNA (even with a valid token, an attempt from an unknown network is blocked)

AI in ZTA defense (2025+)

AI-powered SIEM and SOAR strengthen ZTA through:

  • Automatic correlation of signals from multiple pillars (identity + device + network + data)
  • Predictive risk analysis (identifying compromise before it materializes)
  • Autonomous response (device isolation, token revocation, session termination without human intervention)

NOTE

The NSA in a 2025 report indicates that autonomous incident response (SOAR playbooks without human-in-the-loop) is desirable in IT, but in OT requires caution - automatically cutting communication to a PLC can cause an uncontrolled process shutdown.

Case studies - lessons from deployments

Google BeyondCorp - 10+ years of experience

Google BeyondCorp is the oldest and most extensively documented ZTA deployment. Key lessons:

  • No VPN - 130,000+ Google employees access resources without VPN, through BeyondCorp proxy verifying identity and device posture
  • Long tail problem - migrating 80% of resources was relatively quick, but the last 20% required disproportionately more effort (specific applications, legacy systems, edge cases)
  • Iterative approach - Google has been publishing BeyondCorp papers since 2014 and continues to iterate; ZTA is not a project with an end date
  • Device Trust - Google requires the device to be managed and have a current trust certificate before the Policy Engine even considers the access request

DoD - Zero Trust at national scale

The US Department of Defense is deploying ZTA across all systems - classified and unclassified:

  • 91 Target Level activities - minimum required from every DoD component by end of FY2027
  • 61 Advanced Level activities - for highest-risk systems, by FY2032
  • Navy pilot result - during testing with Microsoft Security, Navy personnel achieved 100% success across 91 Target Level activities
  • Strategy 2.0 - the Pentagon plans to publish an updated ZT strategy in early 2026

TIP

The DoD ZTA Roadmap is publicly available. Even if your organization is not subject to US regulations, the 91 Target Level activities serve as a ready-made checklist that maps to CISA ZTMM v2.0 and can function as a maturity benchmark.

Implementation roadmap - from quick wins to full architecture

Implementing Zero Trust is a multi-year project. The roadmap below describes three phases, from actions that can be taken within weeks to architecture transformation spanning 2-3 years.

Phase 1: Foundations (0-6 months)

Goal: eliminate the most common entry vectors without revolutionizing infrastructure.

  • Enforce MFA on all accounts with remote and privileged access - phishing-resistant (FIDO2/passkeys) where possible
  • Asset inventory - you cannot protect what you cannot see; a complete ICS asset inventory is the starting point for OT environments
  • IT/OT macrosegmentation - if it doesn’t exist, a firewall at the IT-OT boundary with a DMZ is priority number one
  • Deploy central IdP - consolidate identity management (Entra ID, Okta) with conditional access policies
  • Disable inactive accounts - review and deactivate accounts unused for >90 days

Phase 2: Expanding controls (6-18 months)

Goal: transition from macrosegmentation to microsegmentation, deploy continuous monitoring.

  • IT network microsegmentation - east-west policies at the workload and application level
  • EDR/XDR on all IT endpoints and OT engineering workstations (Level 2-3)
  • ZTNA instead of VPN for remote access - verify user and device before each connection
  • PAM for privileged accounts - session recording, password rotation, just-in-time elevation
  • OT NDR - passive monitoring in the OT network with no process impact; anomaly detection in industrial protocols
  • Data classification and DLP deployment at the IT/OT zone boundary

Phase 3: Optimization and automation (18-36 months)

Goal: dynamic policies, automated response, continuous improvement.

  • Microsegmentation in OT - granular policies at the cell/area zone level from IEC 62443
  • Orchestration automation - SOAR playbooks responding to incidents without manual intervention
  • Continuous validation - breach and attack simulation (BAS), regular red team penetration tests
  • Threat intelligence integration - feeding the Policy Engine with current OT threat data
  • Zero Trust at the OT application layer - mTLS for new protocols (OPC UA), protocol-aware allowlisting for legacy

NOTE

Going through all three phases does not mean replacing your entire infrastructure. In our experience, most industrial organizations complete Phase 1 within their existing budget, using tools already present in the organization (Entra ID, Windows Defender, existing firewalls). The key is properly configuring what you already have.

Checklist: assessing your organization’s Zero Trust readiness

The list below allows you to assess where your organization is on the implementation journey. Every unchecked item is a potential attack vector that Zero Trust is designed to eliminate:

Identity

  • Central IdP (Entra ID, Okta) for all users
  • MFA on all accounts with remote access
  • Phishing-resistant MFA (FIDO2/passkeys) for privileged accounts
  • Automatic deactivation of inactive accounts (>90 days)
  • Just-in-time access for administrative operations

Devices

  • Complete inventory of IT and OT devices with current metadata
  • EDR/XDR on workstations and servers
  • Device compliance check before granting access
  • BYOD policy with corporate data separation

Networks

  • IT/OT macrosegmentation with DMZ
  • IT network microsegmentation (east-west)
  • Internal traffic encryption (mTLS, IPsec)
  • ZTNA instead of classic VPN for remote access
  • Microsegmentation in OT at the cell/area zone level

Applications and data

  • Application inventory and classification (sanctioned vs shadow IT)
  • WAF and DAST/SAST in the CI/CD pipeline
  • Data classification and DLP policies
  • Data encryption at-rest and in-transit

Visibility

  • Central SIEM/XDR platform collecting logs from IT and OT
  • OT NDR monitoring industrial protocols
  • Automated alerts and SOAR playbooks
  • Regular penetration tests and BAS

How to start

Zero Trust is not a one-time project but a shift in security philosophy. SolarWinds, Colonial Pipeline, FrostyGoop - each of these incidents confirmed that the perimeter model does not protect organizations against a determined adversary. Organizations that approach Zero Trust in phases - starting with identity and segmentation, and ending with automation and continuous validation - achieve measurable results without decision paralysis.

If your organization manages OT infrastructure, it is worth starting with an assessment of the current state of segmentation and access control. SEQRED performs IEC 62443 compliance audits, security architecture design, and microsegmentation deployments in industrial environments. We help transition from the perimeter model to Zero Trust without disrupting production processes - schedule a free initial consultation, during which we will assess your starting point.

Additional materials on remote work security and the Defense in Depth model in DCS systems can be found in our related articles.

Sources

Omówimy zakres, metodykę i harmonogram.