How can Zero Trust concepts be adapted to constrained OT/ICS-style networks—shaped by legacy devices, safety constraints, and 24/7 operations—without breaking availability or operator workflows?

01

Zero Trust Without Clean Identity

Many ICS and OT assets cannot run modern identity stacks, so current work surveys how NIST SP 800-207, NIST SP 800-82, and CISA’s Zero Trust Maturity Model handle devices that lack strong per-entity identity, and where they implicitly assume IT-style identity and access management that OT cannot support.

02

Segmentation That Doesn't Break Things

Zero Trust literature for ICS converges on micro-segmentation at Purdue Levels 2–3, but real deployments rarely extend cleanly to Levels 1 and 0; this theme catalogs proposed patterns, their preconditions, and the safety and availability risks they introduce when applied to legacy industrial networks.

03

Telemetry Before Control

Frameworks like NIST SP 800-207 and CISA’s Zero Trust Maturity Model emphasize visibility and continuous monitoring as prerequisites for policy enforcement, yet there are persistent telemetry gaps at lower Purdue levels; this work tracks how different authors propose closing those gaps before pushing Zero Trust controls into ICS environments.

research_focus.sh
$ ./research_focus.sh
[~] Mapping Zero Trust guidance to ICS/OT contexts
[~] Drafting early reference scenarios and architectures across all Purdue levels
[ ] Empirical lab validation and formal publication (planned)