Latest News and Views on Zero Trust from Zentera

Zero Trust: The New Standard for Critical Infrastructure

Written by Tom Horyn | Aug 29, 2025 11:47:47 PM

The Growing Stakes for Critical Infrastructure

Cyber threats to critical infrastructure are no longer theoretical. Just last week, the FBI and Cisco raised alarms over Russian-linked hackers exploiting a legacy Cisco vulnerability to infiltrate industrial networks, including power and manufacturing systems¹. At the same time, AI-powered ransomware campaigns are accelerating, with attackers using generative AI to automate and scale intrusions².

Even more striking: European authorities confirmed a daylight cyberattack on a Norwegian dam, where Russian-affiliated actors manipulated water valves. No systems were damaged, but the message was clear - physical consequences are on the table³.

These events, combined with day-to-day ransomware, phishing, and espionage attempts, underscore why securing critical infrastructure must be both strategic and resilient.

Why Traditional Security Is Failing

Legacy models built on perimeter defenses and hardware segmentation can’t keep pace with modern threats. Once attackers breach the perimeter, they can often move laterally between systems, escalate privileges, and access critical assets.

  • Colonial Pipeline (2021): Ransomware spread laterally after attackers gained initial access, forcing shutdown of the largest U.S. fuel pipeline.
  • Ukraine Power Grid (2015): Stolen credentials allowed adversaries to hop between systems, cutting electricity for hundreds of thousands.

Flat network architectures and hardware controls often:

  • Allow unchecked lateral movement once attackers are inside.
  • Require months or years to plan and deploy, creating long security gaps.
  • Lack identity-based controls needed for modern OT, IoT, and hybrid cloud environments.

In aviation, even highly secure networks remain exposed. As we explored in our Aviation Cybersecurity blog, microsegmentation and Zero Trust are critical to protecting interconnected OT and IT systems from ransomware and third-party access risks.

From Microsegmentation to Zero Trust

At its core, microsegmentation creates secure zones inside a network, much like watertight compartments in a ship. Even if one area is breached, attackers cannot freely access others.

Zero Trust builds on this principle with a simple mandate: never trust, always verify. Every user, device, and application must continuously prove its identity and context before gaining access. This identity-centric approach drastically reduces attack surfaces and prevents breaches from escalating - especially vital in environments tied to public safety and critical services.

The ROI of Software-Defined Zero Trust

Historically, Zero Trust segmentation was pursued with next-generation firewalls and VLANs, requiring expensive hardware and years-long projects. The results: complexity, high cost, and limited coverage.

A software-defined approach changes that. Instead of ripping and replacing infrastructure, organizations can deploy overlays that integrate seamlessly with existing environments. The benefits are compelling:

  • 87% average reduction in annual cyber risk across industries.
  • $25M–$46M in additional value over five years from faster risk reduction.
  • Up to 67% lower total cost of ownership, avoiding unnecessary CapEx and OpEx⁴.

These aren’t just percentages on paper. In one ROI analysis, organizations across utilities, manufacturing, and healthcare each reduced annual cyber risk by $16M–$29M - with cumulative five-year savings exceeding $100M.

For CISOs, CIOs, and operations leaders, the takeaway is simple: faster, lower-cost Zero Trust is not only achievable, it’s quantifiable.

Real-World Context for Decision-Makers

Zero Trust is moving from “best practice” to regulatory expectation. Recent developments highlight the shift:

  • Switzerland now requires all critical infrastructure operators to report cybersecurity incidents, part of a broader global push toward accountability5.
  • The European Union has launched its own vulnerability database to guide operators and reduce systemic risks6.
  • In the United States, congressional hearings continue to spotlight gaps between IT and OT security - 15 years after Stuxnet revealed industrial systems’ weaknesses7.

Globally, regulators are raising the bar. Zero Trust is increasingly the standard organizations are expected to meet.

A Phased Path to Zero Trust

Moving to Zero Trust doesn’t mean flipping a switch overnight. The most successful implementations follow a phased approach:

  1. Asset Discovery and Risk Assessment - inventory devices, users, applications, and critical data flows.
  2. Identity and Access Management - enforce least-privilege access with strong authentication.
  3. Microsegmentation - create secure zones around the most critical assets first, then expand.
  4. Continuous Monitoring and Analytics - detect anomalous behavior and respond in real time.
  5. Extension Across Environments - scale Zero Trust principles to OT, cloud, and remote access.

This practical progression allows organizations to realize immediate benefits while steadily building toward comprehensive coverage.

From Strategy to Standard

Critical infrastructure - whether in aviation, healthcare, energy, or water systems - is now a prime target for nation-state actors and cybercriminals alike. Zero Trust, especially in its software-defined form, offers a proactive, scalable, and cost-effective security framework designed for this reality.

The debate is no longer if Zero Trust is needed, but how quickly it can be implemented.

For leaders shaping the future of critical infrastructure security, the next step is clear: begin the transition now. Start with asset discovery, adopt microsegmentation, and build toward a full Zero Trust architecture that protects both operations and society.

Sources

  1. Wall Street Journal, Reuters – FBI and Cisco security alerts
  2. WIRED – AI-powered ransomware analysis
  3. The Times – Norwegian dam cyberattack coverage
  4. Zero Trust cost analysis
  5. Breached Company – Switzerland infrastructure reporting requirements
  6. Financial Times – EU vulnerability database launch
  7. Industrial Cyber – Congressional hearings on OT security gaps