{"id":751355,"date":"2025-08-21T04:04:51","date_gmt":"2025-08-21T09:04:51","guid":{"rendered":"https:\/\/www.capgemini.com\/us-en\/?p=751355&#038;preview=true&#038;preview_id=751355"},"modified":"2025-08-21T04:04:54","modified_gmt":"2025-08-21T09:04:54","slug":"machines-need-zero-trust-too-why-devices-deserve-context-aware-security","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","title":{"rendered":"Machines need zero trust too: Why devices deserve context-aware security"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Machines need zero trust too: Why devices deserve context-aware security<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2021\/05\/lee-newcombe-e1525680343732-1.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Lee Newcombe<\/h5><h5 class=\"blog-date\">Jun 25, 2025<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>In the <a href=\"https:\/\/www.capgemini.com\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\">first post<\/a> in this series, I wrote about the business and security outcomes that can be achieved for users (and the organizations to which they belong!) by adopting approaches labeled as \u201czero trust.\u201d <strong>But why should we limit ourselves to interactions with human users? Don\u2019t machines deserve a little attention too?<\/strong><\/p>\n\n\n\n<p>The answer, of course, is \u201cyes\u201d \u2013 not least because this would otherwise be a remarkably short post. So, I\u2019m going to talk about the application of those high-level characteristics of zero trust mentioned in my last post \u2013 dynamic, context-based, security \u2013 to operational technology (OT).<\/p>\n\n\n\n<p>As every OT professional will quite rightly spell out \u2013 at length \u2013 OT is not IT. They have grown from separate disciplines, talk different network protocols, have different threat models, and often have different priorities when it comes to the application of the confidentiality, integrity, and availability triad we have used for so long in the security world. When your company faces losses of millions of dollars a day from a production line outage, or your critical national infrastructure (CNI) service can no longer function, availability rapidly becomes the key business issue, particularly where intellectual property may not be a core concern. Before diving into the application of dynamic, context-based, security principles to OT, we should probably set a little more context:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>OT facilities may not be as well-segmented as modern corporate IT networks. They were either isolated or \u201cbehind the firewall,\u201d so why do more? (Of course, <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/cyber-security-design-principles\/examples\/study-operational-tech\">best practice<\/a> has long pointed toward segmentation, however if best practice were always implemented I\u2019d likely be out of a job).<\/li>\n\n\n\n<li>OT covers a vast range of technologies and different types of devices, from sensors out in the field through to massive manufacturing plants. Threat models differ! Context matters.<\/li>\n\n\n\n<li>Devices often have embedded operating systems (typically cut-down versions of standard operating systems); these systems require patching and maintenance if they are not to become susceptible to known vulnerabilities.<\/li>\n\n\n\n<li>Equipment requires maintenance. You\u2019ll often find remote access facilities in the OT environment for the vendors to be able to conduct such maintenance remotely. (You might see where this is going from a security perspective.)<\/li>\n\n\n\n<li>The move toward intelligent industry is pushing OT toward increasing use of machine learning and artificial intelligence, all of which is heavily reliant upon data \u2013 which means you need a way to export that data to the services performing the analysis. Your \u201cair gap\u201d isn\u2019t really an air gap anymore. (And if we\u2019re talking about critical national infrastructure, then there may well also be some sovereignty issues to consider.)<\/li>\n\n\n\n<li>Legacy is a real problem. What happens if a business buys a specialist piece of kit and then the vendor goes bust? It could well form a critical part of the manufacturing process, and so stripping it out is not always possible, let alone straightforward.<\/li>\n\n\n\n<li>OT doesn\u2019t always talk IP. This is a problem for traditional security tools that only understand IP. We need to use specialized versions of traditional security tooling like monitoring solutions \u2013 solutions that can understand the communications protocols in use. Meanwhile, network transceivers\/data converters may contain software components that can sometimes get overlooked from a security perspective.<\/li>\n\n\n\n<li>Good models for thinking about OT security are out there, e.g. the Purdue model and the ISO 62443 series (which provide structures for the different levels of technology and functionality in OT environments, from the physical switches and actuators up to the enterprise information and management systems). It\u2019s not as much of a wild west out there as my words so far may indicate \u2013 but we can do better.<\/li>\n<\/ul>\n\n\n\n<p>For the purposes of this article, the above highlights some interesting requirements from an OT security perspective:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>We need to understand the overall OT environment, and be able to secure access into and within it.<\/li>\n\n\n\n<li>We need to make the OT environment more resilient \u2013 reduce the blast radius of compromise. We really do not want one compromised machine taking out a whole facility.<\/li>\n\n\n\n<li>We want to be able to control machine-to-machine communications, and communications across the different layers of the Purdue model, e.g., from the shop floor to the management systems, or even across to the enterprise environment for import into the data lake for analysis purposes.<\/li>\n<\/ol>\n\n\n\n<p>Lots of interesting problems, some of which seem very similar to those discussed in the context of securing human user access to applications and systems.<\/p>\n\n\n\n<p><strong>How do we start the process of finding some solutions?<\/strong> Well, first things first. We need a way to distinguish the devices we are securing, i.e., some form of machine identity. We have a variety of options here, from the installation of trusted digital certificates through to the use of network-based identifiers (including IP addresses and hardware addresses where available). Once we have identities, we can start to think of how to use them to deliver context-based security.<\/p>\n\n\n\n<p>Let\u2019s start by establishing some baselines of normal behavior:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How do the devices in scope communicate?<\/li>\n\n\n\n<li>What other devices do they communicate with, and what protocols do they use?<\/li>\n\n\n\n<li>Are there some obvious segmentation approaches that we can take based off of those communication patterns? If not, are there some more context-based approaches we can take, e.g., do specific communications tend to take place at specific times of day?<\/li>\n<\/ul>\n\n\n\n<p>Such profiling may need to take place over an extended period of time in order to get a true understanding of the necessary communications. We should certainly be looking at how we control support access from vendors into the OT environment; let\u2019s just start by making sure Vendor A can only access their own technology and not that of Vendor B. Let\u2019s not forget to support access from internal users either, particularly if they have a habit of using personal or other unapproved devices. Going back to that segmentation point for a second, do we have any legacy equipment that is no longer in active support? If so, are we able to segment such kit away and protect access into and out of that environment to limit the risk associated with such legacy kit?<\/p>\n\n\n\n<p>Whether we are trying to apply dynamic, context-based security to machines or users, many of the same considerations apply:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Is there a way to uniquely identify and authenticate the entities requesting access?<\/li>\n\n\n\n<li>Where are the signals going to come from to enable us to define the context used to either grant or deny access?<\/li>\n\n\n\n<li>How can we segment the resources to which access is being requested?<\/li>\n\n\n\n<li>Where are we going to apply the enforcement mechanisms that act as the barriers to access? Do these mechanisms have consistent network connectivity or must they operate independently?<\/li>\n\n\n\n<li>How do we balance defense in depth with simplicity and cost of operation?<\/li>\n<\/ol>\n\n\n\n<p>If an organization already has some technologies that can help to deliver the required outcomes, e.g., some form of secure software edge, there will often be some merit in extending that coverage to the OT environment, particularly with respect to remote access into such environments.<\/p>\n\n\n\n<p>I\u2019ve shown that we can apply the same zero trust principles to machines that we can apply to users. However, knowing the principles and believing they have value is one thing, finding an appropriate strategy to deliver them in an enterprise context is something completely different. The final post in this series will talk about how we can approach doing this kind of enterprise security transformation in the real world.<\/p>\n\n\n\n<p><a id=\"_msocom_1\"><\/a><\/p>\n\n\n\n<p><a id=\"_msocom_1\"><\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">About the author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2021\/05\/lee-newcombe-e1525680343732-1.jpg\" alt=\"Lee Newcombe\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lee Newcombe<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Expert in Cloud security, Security Architecture<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Zero trust isn\u2019t just for humans. As operational technology (OT) environments become more connected and intelligent, machines\u2014from field sensors to industrial controllers\u2014are increasingly exposed to cyber threats.<\/p>\n","protected":false},"author":266,"featured_media":751248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[153],"content-group":[],"class_list":["post-751355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Machines need zero trust too: Why devices deserve context-aware security - Capgemini USA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Machines need zero trust too: Why devices deserve context-aware security\" \/>\n<meta property=\"og:description\" content=\"Zero trust isn\u2019t just for humans. As operational technology (OT) environments become more connected and intelligent, machines\u2014from field sensors to industrial controllers\u2014are increasingly exposed to cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini USA\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T09:04:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T09:04:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lee Newcombe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priyankahitarthtanna\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\",\"name\":\"Machines need zero trust too: Why devices deserve context-aware security - Capgemini USA\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"datePublished\":\"2025-08-21T09:04:51+00:00\",\"dateModified\":\"2025-08-21T09:04:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/79833dfc67169023071e7f5217558001\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"width\":2881,\"height\":1801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Machines need zero trust too: Why devices deserve context-aware security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/\",\"name\":\"Capgemini USA\",\"description\":\"Just another www.capgemini.com site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/79833dfc67169023071e7f5217558001\",\"name\":\"priyankahitarthtanna\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/author\/priyankahitarthtanna\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Machines need zero trust too: Why devices deserve context-aware security - Capgemini USA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","og_locale":"en_US","og_type":"article","og_title":"Machines need zero trust too: Why devices deserve context-aware security","og_description":"Zero trust isn\u2019t just for humans. As operational technology (OT) environments become more connected and intelligent, machines\u2014from field sensors to industrial controllers\u2014are increasingly exposed to cyber threats.","og_url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","og_site_name":"Capgemini USA","article_published_time":"2025-08-21T09:04:51+00:00","article_modified_time":"2025-08-21T09:04:54+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Lee Newcombe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priyankahitarthtanna","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","name":"Machines need zero trust too: Why devices deserve context-aware security - Capgemini USA","isPartOf":{"@id":"https:\/\/www.capgemini.com\/us-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","datePublished":"2025-08-21T09:04:51+00:00","dateModified":"2025-08-21T09:04:54+00:00","author":{"@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/79833dfc67169023071e7f5217558001"},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#primaryimage","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","contentUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","width":2881,"height":1801},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/us-en\/"},{"@type":"ListItem","position":2,"name":"Machines need zero trust too: Why devices deserve context-aware security"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/us-en\/#website","url":"https:\/\/www.capgemini.com\/us-en\/","name":"Capgemini USA","description":"Just another www.capgemini.com site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/79833dfc67169023071e7f5217558001","name":"priyankahitarthtanna","url":"https:\/\/www.capgemini.com\/us-en\/author\/priyankahitarthtanna\/"}]}},"blog_topic_info":[{"id":153,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":153,"name":"Cybersecurity","slug":"cybersecurity"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Machines need zero trust too: Why devices deserve context-aware security","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini USA","logo":""},"keywords":[],"dateCreated":"2025-08-21T09:04:51Z","datePublished":"2025-08-21T09:04:51Z","dateModified":"2025-08-21T09:04:54Z"},"rendered":"<meta name=\"parsely-title\" content=\"Machines need zero trust too: Why devices deserve context-aware security\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/machines-need-zero-trust-too-why-devices-deserve-context-aware-security\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-08-21T09:04:51Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":751247,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","url_meta":{"origin":751355,"position":0},"title":"Zero trust and users: Cutting through the noise","author":"priyankahitarthtanna","date":"August 20, 2025","format":false,"excerpt":"At its core, cybersecurity aims to ensure the right people have the right access to the right systems and data at the right time.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751352,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/making-it-real-bringing-zero-trust-to-life-in-your-business\/","url_meta":{"origin":751355,"position":1},"title":"Making it real: Bringing zero trust to life in your business","author":"priyankahitarthtanna","date":"August 21, 2025","format":false,"excerpt":"My aim was to discuss \u201czero trust\u201d in more practical, business-focused terms, and to show folks how they can do this stuff in the real world.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025_701e9e.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025_701e9e.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025_701e9e.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025_701e9e.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":748224,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/raising-network-subscribers-awareness-of-energy-consumption-a-new-way-for-csps-to-tackle-scope-3-emissions\/","url_meta":{"origin":751355,"position":2},"title":"Raising network subscribers\u2019 awareness of energy consumption: A new way for CSPs to tackle Scope 3 emissions","author":"jayantapakrashi","date":"July 1, 2025","format":false,"excerpt":"Learn about the challenges of Scope 3 indirect emissions in mobile networks, and how a tool Capgemini is developing with Nokia and Google may address them.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/energy-consumption-v1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/energy-consumption-v1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/energy-consumption-v1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/energy-consumption-v1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751250,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/cybersecurity-2025-embracing-resilience-in-an-era-of-disruption\/","url_meta":{"origin":751355,"position":3},"title":"Cybersecurity 2025: Embracing resilience in an era of disruption","author":"priyankahitarthtanna","date":"August 20, 2025","format":false,"excerpt":"From quantum threats to AI-driven attacks, discover the key trends shaping the future of security and how organizations can stay ahead.","rel":"","context":"In \"Cybersecurity\"","block_context":{"text":"Cybersecurity","link":"https:\/\/www.capgemini.com\/us-en\/tag\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":730487,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/reflections-from-climate-week-2024-why-workplace-services-deserve-a-bigger-slice-of-sustainability-budgets\/","url_meta":{"origin":751355,"position":4},"title":"Reflections from Climate Week 2024: Why workplace services deserve a bigger slice of sustainability budgets","author":"","date":"October 11, 2024","format":false,"excerpt":"Reflections from Climate Week 2024: Why workplace services deservea bigger slice of sustainability budgetsAlan Connolly10 Oct 2024 FacebookTwitterLinkedin As sustainability budgets grow, many companies are making significant investments in decarbonization, renewable energy, and broader environmental initiatives. However, one key area has been noticeably left out:\u202fworkplace devices.\u202fDespite their critical role in\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Sustainable-web-preview-banner-2024b.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Sustainable-web-preview-banner-2024b.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Sustainable-web-preview-banner-2024b.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":711918,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/top-five-pro-tips-for-designing-agile-hybrid-workplace\/","url_meta":{"origin":751355,"position":5},"title":"Top five pro tips for designing agile hybrid workplace","author":"Sai Kiran","date":"January 17, 2024","format":false,"excerpt":"Top five pro tips for designing agile hybrid workplaceCapgemini2022-01-17 The world has woken up to the new realities of hybrid working for the business benefits and flexibility it offers. Now, organizations need to reimagine their workplace to support on-site and remote employees while keeping them happy and productive. They are\u2026","rel":"","context":"In \"Digital Workplace\"","block_context":{"text":"Digital Workplace","link":"https:\/\/www.capgemini.com\/us-en\/tag\/digital-workplace\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Capgemini_Expert-Perspectives_Top-five-pro-tips-for-designing-agile-hybrid-workplace.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Capgemini_Expert-Perspectives_Top-five-pro-tips-for-designing-agile-hybrid-workplace.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Capgemini_Expert-Perspectives_Top-five-pro-tips-for-designing-agile-hybrid-workplace.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Capgemini_Expert-Perspectives_Top-five-pro-tips-for-designing-agile-hybrid-workplace.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini USA","distributor_original_site_url":"https:\/\/www.capgemini.com\/us-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Zero-trust-web-banner-2025.jpg","author_title":"Lee Newcombe","author_thumbnail_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2021\/05\/lee-newcombe-e1525680343732-1.jpg?w=600","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/751355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/users\/266"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/comments?post=751355"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/751355\/revisions"}],"predecessor-version":[{"id":751356,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/751355\/revisions\/751356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media\/751248"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media?parent=751355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/categories?post=751355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/tags?post=751355"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/brand?post=751355"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/service?post=751355"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/industry?post=751355"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/partners?post=751355"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/blog-topic?post=751355"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/content-group?post=751355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}