How Zero Trust Transforms Control System Security

Nov. 11, 2024
A manufacturer’s initial frustration at being locked out of their new HMI software evolved into an appreciation for built-in zero trust measures to protect industrial operations from a range of cyber threats.

It all started with a support call. A customer reached out, frustrated that after installing 
their new HMI software they couldn’t do anything. “Everything’s locked down. I can’t 
access any configuration or features,” they said. 

At first, it sounded like a typical installation issue—maybe a licensing problem or some 
misconfigured settings. But after a few questions, it became clear that they had chosen the 
"Secure Installation Option" during setup, unknowingly activating a zero-trust 
configuration.

As we walked the customer through their installation, it became apparent this wasn’t just a 
fix-it situation; it was a much larger conversation about zero trust security. What initially 
seemed like a hindrance was actually a feature designed to ensure security from the very 
first moment the software was installed. This led to a deeper dialogue about the 
importance of intentional security in industrial control system environments and how zero 
trust principles are fundamentally changing the game.

What is zero trust?

At its core, zero trust is a cybersecurity model based on the idea of "never trust, always 
verify." In industrial control systems (ICS), where openness and accessibility have long 
been the default, this concept feels foreign. Historically, ICS software installations were 
open by design, relying on perimeter-based security. Once inside the network, however, 
users often had unfettered access. But zero trust flips this model, limiting access and 
enforcing security from the inside out.

Zero trust requires continuous verification of both users and devices, granting access only 
when conditions are met. For ICS environments, this means that users must authenticate 
their identity and prove their device’s security posture before they can access specific 
systems or applications. No broad network access, no shortcuts—everything is intentional 
and deliberate.

The idea of zero trust isn’t confined to local systems; it’s critical when extending remote 
access to industrial systems, which has traditionally been achieved through VPNs and 
remote desktop protocol. These methods often provide excessive access to the network if 
not managed properly. Once someone (or something, such as malware) gets through, they 
have access to a wide range of systems creating significant vulnerabilities, as any breach of 
the perimeter can result in unrestricted lateral movement within the network. A zero-trust 
approach, specifically zero trust network access (ZTNA), significantly mitigates these risks 
by only granting access to specific applications or services based on identity and device 
posture.

Simplifying security

The zero-trust approach often relies on a cloud/agent architecture to dynamically manage 
security and control access. Here’s how it works:

  • Agent deployment: A lightweight agent is installed on the target remote system.
  • Cloud-based management: The cloud component serves as a centralized access 
    manager, often integrated with an identity provider like Office365, to authenticate 
    users (including multifactor authentication) and verify devices in real time before 
    granting access.
  • Secure tunnels: Rather than providing broad network access, secure tunnels are 
    created between the user’s device and the agent, brokering connections with only 
    specific endpoints.
  • Dynamic policy enforcement: Access policies adapt in real time based on factors like 
    location and device security, constantly adjusting to ensure only the right people 
    and devices can connect.

Zero trust as the new standard

By the end of our conversation, the customer not only had their ICS software up and 
running but also understood they had been introduced to a more secure way of thinking 
about network and application security. Their initial frustration of being “locked out” 
transformed into an appreciation for the built-in zero trust measures, which would help 
protect their industrial operations from an evolving range of cyber threats.

But the story didn’t end there. Inspired by the security advantages they were seeing, the 
customer also opted for a ZTNA remote access solution to further safeguard their 
operations. We worked closely with their team to deploy the system, ensuring that remote 
users had secure, limited access to only what they needed. This additional layer of 
protection secured their network and allowed them to retire less secure VPN-based remote 
access methods.

The successful deployment led to even deeper conversations around IT/OT convergence, 
particularly in aligning security policies across both realms. We helped pull in their cyber 
and identity management teams, guiding discussions that unified security efforts between 
IT and OT, strengthening their overall cybersecurity posture.

What began as a simple support call turned into a broader initiative, demonstrating how 
adopting zero trust not only mitigates risks but facilitates long-term security strategies. So, 
the next time you’re faced with a “Secure Installation Option” remember that it could be 
your first step toward becoming the security hero your organization needs—ushering in a 
stronger, more resilient approach to protecting critical infrastructure.

Dan Malyszko is vice president at Malisko Engineering, a certified member of the Control 
System Integrators Association (CSIA). See Malisko Engineering’s profile on the CSIA 
Industrial Automation Exchange.

 

Sponsored Recommendations

Why Go Beyond Traditional HMI/SCADA

Traditional HMI/SCADAs are being reinvented with today's growing dependence on mobile technology. Discover how AVEVA is implementing this software into your everyday devices to...

4 Reasons to move to a subscription model for your HMI/SCADA

Software-as-a-service (SaaS) gives you the technical and financial ability to respond to the changing market and provides efficient control across your entire enterprise—not just...

Is your HMI stuck in the stone age?

What happens when you adopt modern HMI solutions? Learn more about the future of operations control with these six modern HMI must-haves to help you turbocharge operator efficiency...