In a recent webinar, experts from Dragos, BlastWave, and Carahsoft came together to share valuable insights on OT (Operational Technology) Zero Trust deployments. David McAlister, Nate Blanquie, Chuck Weissenborn, and Joe Baxter, seasoned professionals with hands-on experience in the field, discussed the unique challenges, success stories, and best practices for securing OT environments. These lessons are crucial for anyone looking to protect their critical infrastructure from cyber threats while maintaining the integrity and availability of essential systems.
Here are some of the key takeaways from the discussion.
As highlighted by Chuck Weissenborn, CTO for Dragos Public Sector, Zero Trust in OT environments is fundamentally different from IT deployments. In OT, the focus is on safety and system availability, not just data security. These systems power critical infrastructure like water treatment plants, power grids, and manufacturing processes. While IT environments are primarily concerned with protecting sensitive data, OT systems must ensure that essential operations continue without disruption, even when under attack.
In OT, the biggest priority is keeping these systems safe from interference, ensuring the continuous operation of processes that directly affect human life and mission-critical functions. As Weissenborn explained, the end goal is to "deny, defeat, and deter adversaries" from causing damage to these vital systems.
Deploying Zero Trust in OT environments presents its own set of challenges. Joe Baxter, a solutions architect at Blastwave, explained how OT systems, such as SCADA systems and PLCs, operate differently from IT systems, making it essential to prioritize availability over data confidentiality. In OT environments, security measures that may work in IT can sometimes disrupt operations or even compromise safety.
For example, many OT systems cannot handle traditional antivirus software or other security solutions that might interrupt real-time operations. As Joe mentioned, it’s not just about securing data but ensuring that the process continues uninterrupted. This is especially true when it comes to systems like SCADA networks, which rely on constant communication between devices.
One of the most critical components of a successful Zero Trust deployment in OT environments is visibility. Without a clear understanding of how devices communicate and interact, it’s nearly impossible to secure these systems. David McAlister from Dragos emphasized that gaining visibility into every device and process is essential for detecting unusual behavior and preventing threats.
In one instance discussed during the webinar, visibility tools helped identify that several surveillance cameras in an OT environment were "phoning home" to unknown servers. The organization believed its systems were air-gapped and isolated from the internet. However, visibility tools allowed them to detect and stop this unexpected traffic. This example underscores the importance of having robust tools that provide deep insight into OT networks.
Threat intelligence plays a critical role in shaping OT security strategies. Nate Blanquie, Senior Solutions Architect at Dragos, explained how incorporating threat intelligence allows organizations to prioritize defenses against known adversary tactics, techniques, and procedures (TTPs). This helps guide where organizations should focus their resources, ensuring that they defend the most vulnerable parts of their network.
In one deployment, threat intelligence enabled a medium-sized utility company to detect malicious activity that would have otherwise gone unnoticed. Even though they were up against a well-resourced adversary, the use of Zero Trust principles and strong visibility tools allowed the utility to detect and thwart the attack. This example illustrates how even smaller organizations can defend against sophisticated threats by focusing on the right areas.
Several success stories were shared during the webinar, showcasing the effectiveness of OT Zero Trust deployments. One example involved a water treatment facility where the network was transitioned from a flat, open architecture to a segmented, Zero Trust model. Despite having 91 devices in one large network, the team was able to microsegment these into 89 subnets, each with a single device, in a matter of weeks—without disrupting operations.
This transformation was achieved through collaboration between IT and OT teams, who worked together to implement security measures without affecting production. As Chuck Weissenborn pointed out, having the right partner and the right technology in place can turn a complex project into a manageable one, delivering security benefits without compromising operational integrity.
One of the often-overlooked benefits of Zero Trust deployments in OT environments is the improved collaboration between IT and OT teams. As Chuck highlighted, bringing together teams that normally don’t interact—such as networking, IT, and engineering—can lead to better outcomes and more robust security measures. In one deployment, the collaboration between IT and OT teams helped solve an issue related to process control, extending the life of equipment and preventing costly repairs.
This type of cross-department collaboration is essential in OT environments, where operational efficiency and cybersecurity need to work hand-in-hand. Breaking down silos and fostering communication across departments ensures that security measures are both effective and operationally feasible.
The speakers provided several recommendations for organizations looking to improve their OT security through Zero Trust:
Zero Trust is not just a buzzword for OT environments—it’s a necessary strategy to protect critical infrastructure from increasingly sophisticated threats. By focusing on safety, visibility, threat intelligence, and collaboration, organizations can successfully deploy Zero Trust principles without compromising the availability and integrity of their systems. The lessons shared by the experts at Dragos, Blastwave, and Carahsoft demonstrate that with the right approach, Zero Trust in OT environments is not only achievable but essential for safeguarding critical systems and maintaining operational continuity.
If your organization is considering Zero Trust for its OT environment, these lessons provide a valuable roadmap for success. Take the next step to your OT Zero Trust Deployment with BlastWave and schedule a demo today.
Experience the simplicity of BlastShield to secure your OT network and legacy infrastructure.