{"id":544771,"date":"2025-06-30T08:43:21","date_gmt":"2025-06-30T08:43:21","guid":{"rendered":"https:\/\/www.capgemini.com\/au-en\/?p=544771&preview=true&preview_id=544771"},"modified":"2025-07-10T08:49:32","modified_gmt":"2025-07-10T08:49:32","slug":"machines-need-zero-trust-too-why-devices-deserve-context-aware-security","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","title":{"rendered":"Machines need zero trust too: Why devices deserve context-aware security"},"content":{"rendered":"\n

Machines need zero trust too: Why devices deserve context-aware security<\/h1><\/div><\/div><\/div><\/div>
\"\"<\/div>
Lee Newcombe<\/h5>
Jun 25, 2025<\/h5><\/div><\/div>
<\/div><\/div><\/div><\/div><\/header>\n\n\n\n
\n

In the first post<\/a> in this series, I wrote about the business and security outcomes that can be achieved for users (and the organizations to which they belong!) by adopting approaches labeled as \u201czero trust.\u201d But why should we limit ourselves to interactions with human users? Don\u2019t machines deserve a little attention too?<\/strong><\/p>\n\n\n\n

The answer, of course, is \u201cyes\u201d \u2013 not least because this would otherwise be a remarkably short post. So, I\u2019m going to talk about the application of those high-level characteristics of zero trust mentioned in my last post \u2013 dynamic, context-based, security \u2013 to operational technology (OT).<\/p>\n\n\n\n

As every OT professional will quite rightly spell out \u2013 at length \u2013 OT is not IT. They have grown from separate disciplines, talk different network protocols, have different threat models, and often have different priorities when it comes to the application of the confidentiality, integrity, and availability triad we have used for so long in the security world. When your company faces losses of millions of dollars a day from a production line outage, or your critical national infrastructure (CNI) service can no longer function, availability rapidly becomes the key business issue, particularly where intellectual property may not be a core concern. Before diving into the application of dynamic, context-based, security principles to OT, we should probably set a little more context:<\/p>\n\n\n\n