On April 29, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with several key government partners including the Department of War (DoW), Department of Energy (DOE), FBI, and Department of State (DOS), released a joint guide titled "Adapting Zero Trust Principles to Operational Technology". This document provides a foundational framework for owners and operators of critical infrastructure to apply a Zero Trust architecture to their OT environments. The guidance acknowledges that OT systems have unique constraints—such as legacy hardware, intolerance for downtime, and direct ties to physical safety—that prevent a simple lift-and-shift of IT security models. It aims to provide a practical, risk-based approach to enhancing cybersecurity in these vital sectors against persistent threats like Volt Typhoon.
While not a binding regulation, this 28-page guide represents official U.S. government guidance and sets a clear expectation for how critical infrastructure sectors should approach cybersecurity modernization. It aligns with the broader federal push towards Zero Trust, as mandated by Executive Order 14028.
The guide is structured around the NIST Cybersecurity Framework (CSF) 2.0 functions: Govern, Identify, Protect, Detect, Respond, and Recover. It emphasizes that Zero Trust is not a single product but a strategic approach and a set of principles that must be adapted to the specific context of OT.
Key principles highlighted include:
This guidance is targeted at all owners and operators of Operational Technology systems, with a particular focus on U.S. critical infrastructure sectors, including:
The guide outlines a roadmap for implementation, focusing on overcoming common challenges in OT environments:
Adopting a Zero Trust model in OT environments will require significant investment and organizational change. Key impacts include:
Organizations should take a phased, risk-based approach:
A core pillar of the guidance is implementing strong network segmentation between IT and OT environments, often following the Purdue Model, to prevent lateral movement.
The guide recommends moving towards strong, multi-factor authentication for all user and device access to OT systems, especially for remote access.
Enforcing the principle of least privilege for all human and machine identities is a foundational concept of Zero Trust for OT.
In line with the CISA guidance, organizations must prioritize the isolation of their OT networks from corporate IT networks. This involves implementing a 'DMZ' (demilitarized zone) architecture using firewalls to strictly control all traffic flow between the two environments. The firewall rule set should be default-deny, only permitting essential, pre-approved communication protocols (e.g., from a specific historian server in IT to a data collector in OT). This segmentation is the single most effective control for preventing threats that compromise the IT network, like phishing or commodity malware, from pivoting into the OT environment and disrupting physical processes.
To implement Zero Trust in OT, organizations must move away from shared or weak credentials. A critical first step is to enforce Multi-Factor Authentication (MFA) for all remote access into the OT network, typically for vendors or remote engineers. Furthermore, MFA should be applied to any privileged access within the OT environment, such as logging into Human-Machine Interfaces (HMIs) or engineering workstations. For legacy systems that don't support MFA natively, this can be achieved through modern identity proxies or secure access gateways that sit in front of the legacy application.
CISA and its partners release the joint guide for Zero Trust in OT environments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.