TroutTrout
Blog

Insights & Resources

Guidance on CMMC compliance, industrial cybersecurity, and OT network protection.

329 articles

CMMCCompliance

What the CMMC Enduring Exception Actually Requires You to Document

The Enduring Exception is not a waiver. It requires specific documentation, compensating controls with evidence, and an Affirming Official signature. Miss any of it and you face False Claims Act exposure.

OT SecurityZero Trust

Why Your OT Network Has No Identity Layer (And What Happens When an Attacker Notices)

The moment an attacker reaches your OT network, they stop having to prove who they are. Flat Layer 2, PLCs that can't do MFA, trust-by-location — it's a lateral movement playground. The fix isn't rewiring the plant. It's putting an identity layer in front of the assets that can't enforce one themselves.

Zero TrustOT Security

Zero Trust for Legacy PLCs: The Lollipop Architecture Explained

Legacy PLCs cannot authenticate users, log sessions, or encrypt traffic. The lollipop architecture puts a proxy in front of each asset, enforcing Zero Trust at the network layer without modifying the device.

Zero TrustOT Security

Agent-Free Zero Trust: Why OT Environments Can't Use Endpoint Software

IT Zero Trust relies on endpoint agents. OT devices cannot run them. Here is why, and how network-layer enforcement provides equivalent protection without touching the device.

Zero TrustCISA

What the New CISA Zero Trust OT Guide Means for On-Premise Deployments

CISA, the Department of War, DOE, FBI, and Department of State published joint Zero Trust OT guidance on April 29, 2026. Three findings matter most for on-premise deployments: agentless network-layer enforcement is endorsed for legacy OT, microsegmentation must operate without redesign, and air-gap alone is called out as a false sense of security.

CMMCManufacturing

CMMC Level 2 for Manufacturers: Why VLANs Are Not Enough for Shop Floor OT

VLANs segment traffic at the switch level. CMMC Level 2 requires identity-based access control, audit logging, and encryption. VLANs provide none of these. Here is what assessors actually look for on the shop floor.

Zero TrustNetwork Segmentation

How to Segment a Flat OT Network Without VLANs or Downtime

Your OT network is flat. Everything can reach everything. VLANs require switch reconfiguration, recabling, and downtime. Overlay networking segments the network in software without touching the physical layer.

CMMCSSP

How to Write an SSP Section for a Network with Legacy PLCs

Your System Security Plan needs to describe how you protect assets that cannot protect themselves. Here is a practical template for documenting legacy PLC networks in your CMMC SSP.

CMMCC3PAO

What a C3PAO Looks for in an OT Environment

C3PAO assessors do not expect PLCs to run endpoint agents. They expect documentation, compensating controls, and evidence on demand. Here is what they actually look for when they walk onto your shop floor.

Zero TrustAir Gap

Zero Trust for Air-Gapped OT Networks: What Works and What Doesn't

Air-gapped does not mean secure. It means isolated from the internet. Zero Trust still applies, but cloud-dependent tools do not work. Here is what does.

OT SecurityBusiness Case

Building the Business Case for OT Network Segmentation

Your CISO knows segmentation matters. Your CFO wants to know what it costs and what it prevents. Here's how to build the business case.

DefenseLaw Enforcement

Cybersecurity for Police Evidence Systems: Sovereign, Auditable, On-Premise

Digital evidence must be tamper-proof, chain-of-custody compliant, and sovereign. Cloud storage doesn't meet these requirements. Here's what does.

Browse all posts (329)