{"id":7699,"date":"2025-12-04T11:33:01","date_gmt":"2025-12-04T19:33:01","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=7699"},"modified":"2025-12-06T09:24:09","modified_gmt":"2025-12-06T17:24:09","slug":"pentagon_zero_trust_guidance","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/","title":{"rendered":"Pentagon Issues Zero Trust Guidance for Securing OT Systems"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>The Pentagon has released its first comprehensive <strong>Zero Trust guidance specifically for Operational Technology (OT)<\/strong>, recognizing that industrial control systems, facility systems, and other mission-critical OT assets cannot be secured the same way as traditional IT. The new <em>Zero Trust for Operational Technology \u2013 Activities and Outcomes<\/em> framework outlines clear requirements for user access, device identity, workload integrity, network segmentation, analytics, and automated decision-making. These requirements where designed with the understanding of OT\u2019s unique constraints such as critical operations, legacy devices, limited ability to patch etc.<\/p>\n<p>The Pentagon\u2019s new OT Zero Trust guidance lays out a pragmatic, OT-aware security model that rejects the assumption that IT Zero Trust patterns can simply be lifted and shifted into industrial environments. Instead, it emphasizes that OT systems operate under strict uptime and safety constraints, run on specialized protocols, rely on legacy devices that often cannot be patched, and are maintained by teams with limited cybersecurity depth, conditions that make traditional IT controls insufficient or even dangerous. To bridge this gap, the DoD introduces OT-specific Activities and Outcomes distributed across the seven Zero Trust pillars (Users, Devices, Workloads, Data, Network, Visibility, and Automation), creating a structured roadmap that acknowledges both operational limitations and mission-critical risk.<\/p>\n<p>The guidance also frames OT security through a simplified three-layer model, Enterprise, Operational, and <span class=\"mention--highlight\">Process<\/span> Control, that complements rather than replaces Purdue and IEC 62443. This abstraction helps clarify how identity services, engineering workstations, firewalls, PLCs, field devices, and safety systems each inherit different Zero Trust controls. Notably, the document moves beyond vague principles and defines testable, measurable requirements: centralized inventories of users and devices; strict RBAC and least-privilege enforcement; PAM solutions that actually work in OT; MFA applied where possible; lifecycle tracking for noncompliant legacy assets; OT-tuned UEBA; robust segmentation with deny-by-default baselines; and automated, evidence-based risk decisions. Together, these elements reflect the DoD\u2019s expectation that all components progress toward Target Level Zero Trust\u2014an achievable standard only if Zero Trust is adapted thoughtfully to the realities of industrial operations rather than forced upon them.<\/p>\n<p>A standout requirement from the guidance is its emphasis on <strong>verifying every device and workload<\/strong> before it is trusted. This includes maintaining an accurate inventory of all OT systems, assessing their vulnerabilities, configuring permissions, and enforcing Role-Based Access Control. The document also contrasts modern IT solutions, such as user and entity behavior analytics, and stresses the need for modern security techniques in OT systems.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"588\" title=\"binlens-trnsp\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1024%2C588&#038;ssl=1\" alt class=\"img-responsive wp-image-6649\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=66%2C38&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=177%2C102&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=200%2C115&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=300%2C172&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=320%2C184&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=400%2C230&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=460%2C264&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=500%2C287&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=540%2C310&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=600%2C344&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=669%2C384&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=700%2C402&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=768%2C441&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=800%2C459&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=940%2C539&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1024%2C588&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1200%2C689&amp;ssl=1 1200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1536%2C881&amp;ssl=1 1536w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?fit=1999%2C1147&amp;ssl=1 1999w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>ObjectSecurity\u2019s technologies directly address these needs. <strong>BinLens\u2122<\/strong> provides deep binary and firmware analysis for OT devices, enabling organizations to uncover vulnerabilities, hidden components, and risky behaviors, all without the need for source code. This supports Zero Trust requirements such as device inventory, risk scoring and supply-chain validation. BinLens can operate with no network access and is ideally suited for secure environments.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p>Our other product, <strong>FortiLayer\u2122<\/strong>, analyzes the AI and analytics components that Zero Trust increasingly depends on. FortiLayer detects vulnerabilities in machine-learning models, identifies adversarial weaknesses, and automates robustness testing. BinLens and FortiLayer give organizations the software assurance and AI integrity needed to confidently implement the Pentagon\u2019s Zero Trust vision for securing OT systems.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"174\" title=\"FortiLayer-FF-transparent\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=1024%2C174&#038;ssl=1\" alt class=\"img-responsive wp-image-7197\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=66%2C11&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=177%2C30&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=200%2C34&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=300%2C51&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=320%2C54&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=400%2C68&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=460%2C78&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=500%2C85&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=540%2C92&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=600%2C102&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=669%2C114&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=700%2C119&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=768%2C131&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=800%2C136&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=940%2C160&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?resize=1024%2C174&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/09\/FortiLayer-FF-transparent.png?fit=1123%2C191&amp;ssl=1 1123w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/binlens\/\"><span class=\"fusion-button-text\">BinLens<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/fortilayer\/\"><span class=\"fusion-button-text\">FortiLayer<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7866,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[92,60,63,93,62],"tags":[],"class_list":["post-7699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-access-control","category-artificial-intelligence","category-binlens","category-dod-gov","category-machine-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pentagon Issues Zero Trust Guidance for Securing OT Systems - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"Pentagon Issues Zero Trust Guidance for Securing OT Systems\",\"datePublished\":\"2025-12-04T19:33:01+00:00\",\"dateModified\":\"2025-12-06T17:24:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/\"},\"wordCount\":6030,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/0trustFI.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Access Control\",\"Artificial Intelligence\",\"BinLens\",\"DoD\\\/gov\",\"Machine Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/\",\"name\":\"Pentagon Issues Zero Trust Guidance for Securing OT Systems - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/0trustFI.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-12-04T19:33:01+00:00\",\"dateModified\":\"2025-12-06T17:24:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/0trustFI.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/0trustFI.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/pentagon_zero_trust_guidance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentagon Issues Zero Trust Guidance for Securing OT Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pentagon Issues Zero Trust Guidance for Securing OT Systems - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"Pentagon Issues Zero Trust Guidance for Securing OT Systems","datePublished":"2025-12-04T19:33:01+00:00","dateModified":"2025-12-06T17:24:09+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/"},"wordCount":6030,"image":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/0trustFI.png?fit=600%2C337&ssl=1","articleSection":["Access Control","Artificial Intelligence","BinLens","DoD\/gov","Machine Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/","url":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/","name":"Pentagon Issues Zero Trust Guidance for Securing OT Systems - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/0trustFI.png?fit=600%2C337&ssl=1","datePublished":"2025-12-04T19:33:01+00:00","dateModified":"2025-12-06T17:24:09+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/0trustFI.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/0trustFI.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/pentagon_zero_trust_guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Pentagon Issues Zero Trust Guidance for Securing OT Systems"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/12\/0trustFI.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=7699"}],"version-history":[{"count":3,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7699\/revisions"}],"predecessor-version":[{"id":7777,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7699\/revisions\/7777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/7866"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=7699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=7699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=7699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}