Piscium
blog

Zero Trust Architecture for Industrial Control Systems

How Zero Trust principles map to the Purdue Model, and why continuous validation is the enforcement mechanism OT environments need.

By Piscium Security Team

Zero Trust Meets Industrial Reality

Zero Trust Architecture (ZTA) has become the dominant security framework for enterprise IT environments. The core premise — "never trust, always verify" — replaces perimeter-based security with continuous authentication and authorization at every access point.

Applying Zero Trust to Industrial Control Systems (ICS) presents unique challenges. OT environments run legacy devices that can't authenticate, operate protocols without encryption, and depend on deterministic communication patterns where microseconds of latency can have physical consequences.

Yet the principles of Zero Trust are more appropriate for ICS than anywhere else. When a compromised controller can cause physical harm, blind trust in any system, user, or communication is indefensible.

The Purdue Model as a Zero Trust Framework

The Purdue Enterprise Reference Architecture (ISA-95) defines six levels for industrial environments:

  • Level 0: Physical process (sensors, actuators)
  • Level 1: Basic control (PLCs, RTUs, safety systems)
  • Level 2: Area supervisory (HMIs, engineering workstations)
  • Level 3: Site operations (historians, MES, OT DMZ)
  • Level 3.5: Industrial DMZ
  • Level 4-5: Enterprise IT and cloud

Traditional OT security treats the Purdue Model as a perimeter defense — firewall rules between levels, with implicit trust within each level. Zero Trust challenges this by eliminating the concept of a trusted zone entirely.

Zero Trust Principles Applied by Level

Cross-Level Communication: Every communication crossing a Purdue level boundary must be explicitly authorized, monitored, and validated. A Level 4 IT system should never directly access a Level 1 controller, regardless of authentication — the architectural constraint itself is a Zero Trust control.

Level 2 — Engineering Access: Engineering workstations that program PLCs represent the highest-risk access points in OT environments. Zero Trust requires:

  • Multi-factor authentication for engineering sessions
  • Session recording and anomaly detection
  • Change authorization workflows before PLC modifications
  • Post-change validation to confirm intended vs. actual modifications

Level 1 — Controller Trust: PLCs and RTUs typically operate without authentication. Zero Trust compensates through:

  • Network microsegmentation that restricts which devices can send write commands
  • Protocol-level monitoring that flags unauthorized function codes
  • Baseline behavioral analysis that detects anomalous communication patterns
  • Physical safety interlocks that operate independently of network security

Level 0 — Process Integrity: Sensors and actuators operate in the physical world. Zero Trust at this level means validating that sensor readings are physically plausible and that actuator commands fall within safe operating parameters — detecting both cyber manipulation and process anomalies.

Microsegmentation in OT Environments

Microsegmentation is the technical implementation of Zero Trust network access. In OT environments, it requires a different approach than IT:

Software-Defined vs. Physical Segmentation

IT microsegmentation typically uses software-defined networking (SDN) and cloud security groups. OT microsegmentation combines:

  • Physical network isolation: Dedicated switches and VLANs for each functional zone
  • Conduit-based access: Communication between zones flows through explicitly defined conduits (ISA/IEC 62443)
  • Unidirectional gateways: Hardware-enforced one-way data transfer for historian feeds and monitoring data
  • Protocol-aware firewalls: Next-generation firewalls that inspect Modbus, DNP3, and OPC UA at the application layer

Implementation Challenges

OT microsegmentation faces practical constraints that IT doesn't:

  • Legacy devices: 15–20 year old PLCs may not support VLAN tagging or modern network configurations
  • Flat network architectures: Many existing OT environments were built with flat, unsegmented networks
  • Operational dependencies: Process safety may require specific communication patterns that segmentation must preserve
  • Vendor access: Third-party maintenance requires carefully scoped access paths that microsegmentation must accommodate without creating permanent trust relationships

Machine-to-Machine Identity

Zero Trust's "verify every identity" principle assumes identities exist. In OT environments, many devices lack identity capabilities:

Engineering-grade devices (workstations, servers, historians) support standard identity frameworks — Active Directory, certificates, MFA. These should be enrolled in identity management platforms.

Industrial devices (PLCs, RTUs, sensors) often authenticate only by IP address or not at all. Zero Trust strategies for these devices include:

  • Network Access Control (NAC): Device profiling and port-based access control (802.1X where supported)
  • MAC-based identity: Using hardware addresses as a device identity layer (with awareness of spoofing risks)
  • Behavioral identity: Establishing communication baselines where a device's normal traffic pattern becomes its identity signature — any deviation triggers investigation
  • Certificate-based protocols: For devices supporting OPC UA or TLS — deploying certificate-based mutual authentication

CTEM as Zero Trust Enforcement

Here's the critical insight: Zero Trust is a policy framework. It defines what should happen. But without continuous validation, you cannot prove it's actually happening.

CTEM provides the enforcement and verification layer that Zero Trust architecture requires:

Segmentation validation: CTEM continuously tests whether microsegmentation actually prevents unauthorized cross-level communication. Firewall rules that look correct in configuration may have implementation gaps that only validation reveals.

Access control verification: Are engineering workstation access controls actually enforced? CTEM validates that MFA requirements, session controls, and authorization workflows cannot be bypassed.

Detection gap analysis: Zero Trust assumes monitoring catches violations. CTEM validates that your detection systems actually alert on unauthorized access attempts, protocol anomalies, and policy violations.

Drift detection: Zero Trust architectures degrade over time. Emergency access grants become permanent. Temporary vendor conduits stay open. Maintenance windows create exception windows that never close. CTEM detects this drift continuously rather than discovering it during the next audit.

Building Zero Trust for ICS Incrementally

Full Zero Trust for ICS isn't a single project — it's an incremental transformation:

  1. Asset inventory: You can't protect what you don't know exists. Complete OT asset discovery is the prerequisite.
  2. Network segmentation: Establishing Purdue-aligned segmentation boundaries with conduit-based communication. Start with IT/OT boundary segmentation, then progress to intra-OT microsegmentation.
  3. Identity and access management: Enforce strong identity on all devices and users that support it. Monitor and baseline everything else.
  4. Continuous validation: Deploy CTEM to verify that every Zero Trust control actually works — segmentation holds, access controls enforce, monitoring detects, and configurations don't drift.

The organization that implements Zero Trust without continuous validation has a policy. The organization that adds CTEM has evidence that the policy works.

For industrial environments where policy failures have physical consequences, evidence is not optional.