Download Publication

Zero Trust Guidance For Critical Infrastructure - Korean Translation
Release Date: 04/14/2025
In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles for securing Critical Infrastructure. As an extensible and holistic enterprise security strategy, Zero Trust is the key for ensuring Critical Infrastructure protection.
More specifically, this document delves into the nuanced application of Zero Trust for Operational Technology and Industrial Control Systems security strategies. First, it clarifies the foundational concepts of Zero Trust. Then, it provides a tailored roadmap for implementing these principles into Operational Technology and Industrial Control Systems settings. This roadmap employs a systematic five-step approach based on the NSTAC Report to the President on Zero Trust.
By leveraging this guidance, organizations will find a clear forward-looking path for continuous improvement of their security postures.
Key Takeaways:
- Unique security risks and threat vectors for Critical Infrastructure
- How Operational Technology converges with digital transformation
- Differences in objectives and architecture of Operational Technology vs traditional Information Technology
- Review of the five-step implementation process for Zero Trust
- How to apply the five-step process to Industrial Controls Systems and Operational Technology security
- How vendors are building Zero Trust capabilities into new technology
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more
Learn more