Zero Trust Access

Control OT/ICS Remote Access

OT/ICS needs maintenance and support – but “VPN into OT” is risky. This use case enables remote access into OT in a controlled way: clear access to only what’s needed, with zones, approvals and time windows (JIT). Goal: within 60 days, fewer OT exceptions and fewer “open doors”.

If you’d like, we’ll show you a typical OT setup in a short demo, together with our technology partner.

Best for

  • Vendor maintenance/engineering needs remote access
  • Today it runs via exceptions and permanent tunnels
  • Security and production are in conflict (“no other way”)

Outcome

  • Remote support possible without opening OT broadly
  • Access only to defined systems/time windows
  • Quickly shut down during an incident

What you get

  • Zone/access model (OT pragmatic)
  • Approval process (who permits what and when)
  • Policies for vendor/engineer access incl. time windows (JIT)
  • Verification and audit trail

Brief explanation

Your Challenge

OT is sensitive, availability matters. At the same time, external and internal teams need access. Broad VPNs or permanent exceptions massively increase risk and are hard to control.

Our Solution

We enable access so that production doesn’t suffer: minimal access, clear approvals, limited time windows (JIT) and rapid shutdown. This reduces risk without blocking operations.
Typical timeframe: 2–4 weeks until pilot in one zone.

Flow

1

Define OT zones and critical systems

2

Define access scenarios (maintenance/engineering)

3

Build policies + approvals + time windows

4

Pilot in one zone, then roll out

5

Reviews & verification

Frequently asked questions

Is this possible with legacy systems?
Often yes – we start pragmatically and work with what’s realistic.


Does this slow down maintenance?
No, when approvals and access are clear. It mainly prevents chaos.


What’s the biggest security gain?
No “VPN into all of OT”, but targeted access + time windows + rapid shutdown.


How do you convince production?
With a pilot: less risk, same or better operations.

Enable OT access – without opening the OT network.

Let’s make remote access into OT controlled, without blocking operations.