The fast evolution of synthetic intelligence (AI) enabled cyberattacks towards our nation’s vital infrastructure is difficult the management of the U.S. Division of Warfare (DOW) to speed up its efforts to implement a complete zero belief (ZT) initiative to guard each its info expertise (IT) and operational expertise (OT) ecosystem.
Compounding this problem, most of the OT property wanted by our warfighters are owned and operated by private-sector entities. Modernizing and enhancing the cyber resilience of those programs is a shared duty and shut collaboration between authorities companies and trade companions is critical to maintain up with evolving risk actors.
In response to Dave Forbes, director of cyber bodily protection at Booz Allen, “You look at the OT guidance in the National Defense Authorization Act, and you see a significant amount of synergy between infrastructure in both the public and private sectors. We need to protect critical infrastructure both within and outside the DOW fenceline.”
Distinctive challenges of securing operational expertise
Operational expertise encompasses the programs and units that monitor and management bodily processes, working throughout a variety of vital sectors together with water and wastewater, vitality, manufacturing, and protection. Security, reliability, and availability are paramount in OT environments as disruptions and cyberattacks can result in operational downtime, gear harm, and lack of security for individuals who function and depend on these programs. Nonetheless, because of the nature of OT programs, conventional safety practices resembling routine patching and lively scanning are usually not at all times viable, and safety modifications usually require shut collaboration amongst varied stakeholders to make sure operational resilience.
“Most OT environments employ legacy equipment and protocols that weren’t designed with security in mind. As OT systems converge with IT, the legacy OT equipment and protocols become security vulnerabilities. Securing OT environments requires cross-functional teams that not only involve IT personnel but also include security engineers, OT and controls engineers, safety personnel, plant managers, and risk and compliance personnel to have a better understanding of the effects1 of security activities on operations and safety.”
Impression of latest zero belief steerage
The DOW has lately formalized its steerage round implementing zero belief actions on OT networks and industrial management programs (ICS) within the Zero Belief for Operational Expertise Actions and Outcomes directive. That is a part of a multi-year journey to pilot and assess the forms of options that might assist implement ZT on OT networks. This follows the DOW’s long run engagement implementing zero belief on IT networks — DoW Zero Belief Technique (2022) and DoD Zero Belief Functionality Execution Roadmap (COA 1) (up to date 2024), which established zero belief pillars and set strategic targets and targets.
Using zero belief prevents lateral motion inside environments and minimizes the impression of breaches. The ZT for OT directive acknowledges the constraints of securing OT environments and backside traces that the implementation of each goal and superior ZT actions is to be achieved whereas sustaining acceptable course of management and security efficiency. There is no such thing as a one-size-fits-all answer to be utilized to realize every end result and skilled safety engineers are wanted to innovate and tailor options to every distinctive OT setting because the risk panorama continues to evolve.
In response to Connor Brown, a Lead OT/ICS cybersecurity engineer, “The guidance which was codified recently has expanded the previous zero trust activities required by the services almost two-fold. Now they must remap and reevaluate strategies based on the new guidance. The implications for a lot of these entities are that they’re going to need a trusted mission partner who understands the threat landscape but also understands how to address these target activities and has experience in implementing zero trust in OT environments. Booz Allen has just deployed the first zero trust for OT pilot for the DOW and it’s probably the first OT focused pilot using real world scenarios. We also have advanced labs for OT innovation where we can help our government customers visualize the environments they are trying to secure.”
As Dave Forbes factors out, “Booz Allen has partnered with the DOW in implementing zero trust for the last several years now through our Thunderdome program. We’re implementing the Thunderdome zero trust solution for IT across the department and our collaboration with DISA has helped to emphasize the importance of ZT for OT. We have an engineering practice where you see the increased application of technologies aligned to AI as well as solutions like machine identity and machine to machine connectivity.”
Booz Allen is additionally making main investments and partnering with distributors resembling and Shift5 to speed up its zero belief for operational expertise capabilities to maintain tempo with the quickly evolving threats.
Conclusions
Businesses can be anticipated to satisfy the “target” actions specified by the brand new steerage by 2027. That may require companies to shortly embed zero belief for OT of their OT safety efforts. The expertise to perform that is accessible now, and the acceleration of subtle threats requires it.
The companies and companies should implement three key ways to safe their OT networks.
- Enhanced asset visibility as a result of you’ll be able to’t safe what you don’t see.
- Implement superior safety controls like zero belief for OT.
- Put money into OT modernization, together with prioritizing task-critical property and updating their legacy programs.
To seek out out extra about how Booz Allen can speed up your zero belief for OT implementation, head to www.boozallen.com/zerotrust.
Copyright
© 2026 Federal Information Community. All rights reserved. This web site isn’t supposed for customers positioned inside the European Financial Space.



