White Paper

ZERO TRUST CONSIDERATIONS FOR UTILITY OT CYBER SECURITY STRATEGIES

ZERO TRUST CONSIDERATIONS FOR UTILITY OT CYBER SECURITY STRATEGIES

Pages 8 Pages

This white paper by EPRI explores the application of zero trust cybersecurity strategies in utility OT environments. It highlights the shift from perimeter-based to data-centric security, emphasizing continuous authentication, identity verification, and context-based access control. The document details impacts on technology, process, and people, and offers a gap analysis between OT characteristics and zero trust needs. It outlines prerequisites such as asset inventory and data flow mapping, and poses research questions to guide future implementation efforts in grid edge and mission-critical systems.

Join for free to read