Zero Trust principles are universal, but Zero Trust implementation is not. A control architecture that works for an enterprise IT environment cannot be applied directly to a SCADA system running Modbus RTU, a DCS managing a chemical process, or a building management system running BACnet over IP. Each OT technology category has its own protocol stack, vendor ecosystem, operational risk profile, and attack surface — and each requires a tailored approach to identity, device trust, network segmentation, application access, and data protection.

The system references below provide practitioner-level guidance for each major OT technology category: what it is, why its security challenges are distinct, how Zero Trust controls apply specifically, which regulatory frameworks govern it, and a brief note on its market scale and deployment context. These are not vendor evaluations — they are architecture and controls references for practitioners responsible for securing these environments.