Keep the Operation Running. The philosophy of OT zero trust was developed as an answer to the problems traditional cyber defenses create in OT environments. See the differences below.
The philosophy of OT zero trust was developed as an answer to the problems traditional cyber defenses create in OT environments. IT cybersecurity uses a priority system called “CIA” - confidentiality first, integrity second, and availability third. OT network security, on the other hand, is based on asset activity so that productivity can always be the highest priority.
This requires a different model, “AIC” - availability is #1, integrity is #2, and confidentiality is #3. The OT Zero Trust approach prepares cyber defenses to never make assumptions about credibility and to continually evaluate trust on the network.
Offered Free by: TXOne Networks
See All Resources from: TXOne Networks