Zero Trust Architecture and the NIST Cybersecurity Framework
By now, we know that information technology (IT) and operational technology (OT) are different, and the controls we apply to IT may not apply to OT. Though technological obstacles could make it difficult to adopt specific controls from Zero Trust Architecture (ZTA), innovative thinking can assist businesses in applying ZTA concepts, even in delicate industrial settings.
In this chapter, we will cover the following topics:
- How MDIoT helps in implementing the NIST Cybersecurity Framework
- How MDIoT helps in ZTA implementation in an OT environment
- Validating ZTA with attack vectors