Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Towards Secure Legacy Manufacturing: A Policy-Driven Zero Trust Architecture Aligned with NIST CSF 2.0
by
Kwak, Jin
, Min, Cheon-Ho
, Kim, Deuk-Hun
, Yang, Haomiao
in
Access control
/ Anomalies
/ Cloud computing
/ Computer architecture
/ Cybersecurity
/ Cyberterrorism
/ Distributed control systems
/ Factories
/ Legacy systems
/ Manufacturing
/ Process controls
/ Ransomware
/ Safety and security measures
/ Security systems
/ Software upgrading
/ Threats
/ Trustworthiness
/ User behavior
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Towards Secure Legacy Manufacturing: A Policy-Driven Zero Trust Architecture Aligned with NIST CSF 2.0
by
Kwak, Jin
, Min, Cheon-Ho
, Kim, Deuk-Hun
, Yang, Haomiao
in
Access control
/ Anomalies
/ Cloud computing
/ Computer architecture
/ Cybersecurity
/ Cyberterrorism
/ Distributed control systems
/ Factories
/ Legacy systems
/ Manufacturing
/ Process controls
/ Ransomware
/ Safety and security measures
/ Security systems
/ Software upgrading
/ Threats
/ Trustworthiness
/ User behavior
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Towards Secure Legacy Manufacturing: A Policy-Driven Zero Trust Architecture Aligned with NIST CSF 2.0
by
Kwak, Jin
, Min, Cheon-Ho
, Kim, Deuk-Hun
, Yang, Haomiao
in
Access control
/ Anomalies
/ Cloud computing
/ Computer architecture
/ Cybersecurity
/ Cyberterrorism
/ Distributed control systems
/ Factories
/ Legacy systems
/ Manufacturing
/ Process controls
/ Ransomware
/ Safety and security measures
/ Security systems
/ Software upgrading
/ Threats
/ Trustworthiness
/ User behavior
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Towards Secure Legacy Manufacturing: A Policy-Driven Zero Trust Architecture Aligned with NIST CSF 2.0
Journal Article
Towards Secure Legacy Manufacturing: A Policy-Driven Zero Trust Architecture Aligned with NIST CSF 2.0
2025
Request Book From Autostore
and Choose the Collection Method
Overview
As smart manufacturing environments continue to evolve, operational technology systems are increasingly integrated with external networks and cloud-based platforms. However, many manufacturing facilities still use legacy systems running on end-of-support/life operating systems with discontinued security updates. It is difficult to mitigate the cyber threats and risks for these systems using perimeter-based security models that isolate them from other networks. To address these constraints, a Zero Trust-based security architecture tailored for legacy manufacturing environments with practical field applicability is proposed. Our architecture builds upon the six core functions outlined in National Institute of Standards and Technology Cybersecurity Framework 2.0—identify, protect, detect, respond, recover, and govern—adapting them specifically to manufacturing environment security challenges. To achieve this, the architecture combines asset identification, policy-driven access control, secure SMB gateway transfers, automated anomaly detection and response, clean image recovery, and organizational governance procedures. This study validates the effectiveness and scalability of the proposed architecture through scenario-based simulations. When combining the EoSL defense hardening and gateway-based perimeter control, the architecture achieves approximately 99% overall threat suppression and a 98% reduction in critical-asset infection rates, demonstrating its strong resilience and scalability in large-scale legacy OT environments.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.