Zero Trust Network Access Solutions in Operational Technology Environments

New Approaches of Remote Access in Industrial Environments

  • Ádám Tóth
doi: 10.32567/hm.2025.4.6

Abstract

The thesis examines the cybersecurity challenges of remote access to industrial systems (OT), with particular emphasis on the vulnerabilities of VPN-based solutions and the potential implementation of zero trust network access (ZTNA) technology built on zero trust architecture. It compares the operation of VPN and ZTNA, highlighting advantages and limitations such as the extent to which the principle of least privilege is enforced, identity-based access management, and simplified policy control. The study also explores the possibilities for integrating ZTNA into OT environments, taking into account the Purdue model and addressing architectural feasibility as well as other implementation challenges. The findings indicate that while ZTNA can enhance OT cybersecurity, its successful deployment depends on proper infrastructure preparation, gradual rollout, and careful consideration of the cost–benefit ratio.

Keywords:

industrial control system OT remote access ZTNA zero trust network access

References

ALEXANDER, Otis – BELISLE, Misha – STEELE, Jacob (2020): MITRE ATT&CK® for In-dustrial Control Systems: Design and Philosophy. Bedford, MA, USA: The MITRE Corpo-ration, 21–85.

ANDERSSON, Niklas (2023): The Effect of the IT/OT Gap on the NIS 2 Implementation. Szakdolgozat. Stockholm: Stockholm University Department of Computer and Systems Sci-ences. Online: https://su.diva-portal.org/smash/record.jsf?pid=diva2%3A1784461&dswid=5127

CrowdStrike 2026. Global Threat Report. Online: https://www.crowdstrike.com/en-us/global-threat-report/

Dragos (2025): 2025 OT. Cybersecurity Action Guide. Online: https://hub.dragos.com/hubfs/312-Year-in-Review/2025/Dragos_2025_OT_Cybersecurity_Global_Action_Guide.pdf?hsLang=en

Fortinet (2025): ZTNA vs VPN – What's The Better Cybersecurity Solution? Online: https://www.fortinet.com/resources/cyberglossary/ztna-vs-vpn

FRÉSZ Ferenc (2025): Milliárdnyi kiszivárgott hitelesítő adat. Online: https://substack.com/@ferencfresz/p-166319450

KOCSIS Tamás (2025): Ipari (OT) kiberbiztonsági szakember képzés. Óbudai Egyetem Neumann János Informatikai Kar, prezentáció.

LEE, Robert M. – CONWAY, Tim (2022): The Five ICS Cybersecurity Critical Controls. SANS. Online: https://sansorg.egnyte.com/dl/R0r9qGEhEe

LOBO, Ruben (2023): Zero Trust Network Access (ZTNA) – Revolutionizing Remote Ac-cess Security Across OT Environments. Industrial Cyber, 2023. december 3. Online: https://industrialcyber.co/zero-trust/zero-trust-network-access-ztna-revolutionizing-remote-access-security-across-ot-environments/

MAVROUDIS, Vasilios (2024): Zero-Trust Network Access (ZTNA). Online: https://doi.org/10.48550/arXiv.2410.20611

MITRE Corp. (2025): ICS Matrix. Online: https://attack.mitre.org/matrices/ics/

SCOTT, Rose et al. (2020): Zero Trust Architecture. NIST Special Publication 800-207. On-line: https://doi.org/10.6028/NIST.SP.800-207

The Claroty Team (2023): ICS Security: The Purdue Model. Online: https://claroty.com/blog/ics-security-the-purdue-model

ZAYTSEV, Alexey (2023): OT Remote Access: Can You Trust Your Technician’s Laptop? Cisco Blogs, 2023. november 9. Online: https://blogs.cisco.com/industrial-iot/ot-remote-access-can-you-trust-your-technicians-laptop