Advertisement

Pentagon posts guidance on implementing zero trust for operational technology

The guidance includes 105 zero-trust activities and capability outcomes to implement in OT environments.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
Zero trust security system big data concept rendering (Getty Images)

The Defense Department recently published a new document outlining how organizations should apply zero-trust cybersecurity principles for operational technology systems.

Posted in November by the Pentagon’s chief information office, the guidance includes 105 zero-trust activities and capability outcomes to implement in operational technology (OT) environments — including 84 activities considered minimum “target levels” and 21 for “advanced levels” of zero trust. In addition, the list is divided across seven pillars: users; devices; applications and workloads; data; networks and environments; automation and orchestration; and visibility and analytics.

Zero trust is a cybersecurity concept that assumes networks are always compromised by adversaries, meaning the Pentagon must implement controls to consistently monitor and authenticate users and their devices.

The department has been working to adopt zero trust for its IT systems since 2022, but officials have previously stated that they planned to expand the effort to OT — broadly defined in the document as “programmable systems and devices that interact with the physical environment or manage devices that interact with the physical environment.”

Advertisement

As such, OT environments can include facility control systems, power grids, energy management systems, transportation systems and some elements of a weapon system or defense critical infrastructure component. For example, the controls can apply to a power source for a specific weapon, but not that system’s internal targeting or firing systems.

Furthermore, the Pentagon has divided the OT environment into two layers: an operational layer and a process control layer.

Graph of differences between enterprise IT and operational technology environments (Source: Department of Defense)

Because of the differences between IT and OT environments, different approaches must be taken to achieve zero trust for both. The new guidance specifically notes that OT systems often leverage legacy equipment and are operated by a high-specialized workforce with engineering expertise.

“While the core principles of [zero trust] — data protection, strong authentication, network segmentation, and threat monitoring — apply to OT, their implementation and deployment timescales require careful consideration of OT-specific constraints and priorities,” the document stated. “These challenges make [zero trust] adoption more difficult in OT environments and require modifications to the activities and outcomes.”

Advertisement

To account for these distinctions, the Pentagon’s new zero-trust guidance includes activities tailored specifically to challenges and requirements of operational technology systems. At the same time, the outcomes are closely aligned with those for IT systems.

“The commonality between the [zero trust] for IT and [zero trust] for OT guidance facilitates phased interoperability between the [zero trust] for IT and [zero trust] for OT implementations,” the guidance noted. “For example, credentialing, asset management, threat detection, actor role and attribution, and behavioral analytics may be initially installed locally within the OT environment; they will eventually be integrated with the comparable Enterprise IT tools and standards to provide a common approach across a Component and the [Defense Department] at large.”

While Pentagon components must reach target levels of zero trust for their IT systems by the end of fiscal 2027, the new document does not give a concrete deadline for OT environments.

The department intends to publish an updated Zero Trust Strategy in early 2026 and develop additional guidance for both weapon systems and defense critical infrastructure.

Mikayla Easley

Written by Mikayla Easley

Mikayla Easley reports on the Pentagon’s acquisition and use of emerging technologies. Prior to joining DefenseScoop, she covered national security and the defense industry for National Defense Magazine. She received a BA in Russian language and literature from the University of Michigan and a MA in journalism from the University of Missouri. You can follow her on Twitter @MikaylaEasley

Latest Podcasts