How to Apply the NCSC/CISA 2026 Guidance

Hardware-enforced OT Security solutions help industrial operators follow the latest multi-government OT security guidance.
Picture of Waterfall team

Waterfall team

How to Apply the NCSC CISA Secure Connectivity Principles for Operational Technology (OT) 2026 Guidance

For the first time, joint guidance from the UK NCSC, co-signed by CISA, BSI, Australia’s ACSC and others, calls for centralizing risky connections into OT networks, simplifying instructions sent into OT so they can be inspected for safety, and even “browsing down” for engineering workstation access. Alongside these newer ideas, it reinforces more established advice, such as hardening OT boundaries with hardware-enforced protections like Unidirectional Gateways and Hardware-Enforced Remote Access.

The challenge is that the guidance is fairly abstract. The principles are clear, but how to apply them in real OT architectures is not always obvious.

What are the 8 core principles of the NCSC / CISA “Secure connectivity principles for Operational Technology (OT)” guidance, and how does Waterfall support their application?

1) Balance the risks and opportunities – Waterfall’s Unidirectional Gateways dramatically reduce cyber risks to connected OT networks. One-way hardware prevents attack information from reaching back into OT networks, significantly reducing risks for even obsolete, unpatchable targets.

2) Limit the exposure of your connectivity – Waterfall’s Secure Bypass product is a time-limited switch, controlling how often and how long vulnerable software components are exposed to external networks, Waterfall’s Unidirectional Gateways are intrinsically outbound connections – no inbound threat is possible to connected devices through the gateways.

3) Centralise and standardise network connections – Waterfall’s Unidirectional Gateways scale from the smallest DIN rail form factors to 10Gbps rack-mount devices supporting dozens of simultaneous connectors & replications, making both distributed and centralized deployment straightforward.

4) Use standardised and secure protocols – Waterfall’s Unidirectional Gateways support dozens of OT protocols and applications, both plain-text and encrypted versions. Better yet, even when using plain-text communications into IT networks, no session hijack or other plain-text attack can reach through the unidirectional hardware back into the OT network to put physical operations at risk.

5) Harden your OT boundary – The guidance recommends hardware-enforced unidirectionality and integrity filtering. Waterfall’s Unidirectional Gateways enforce unidirectionality in hardware. Waterfall’s Hardware-Enforced Remote Access (HERA) uses a hardware filter to ensure only HERA protocol information can enter the OT side of the HERA device.

6) Limit the impact of compromise – Waterfall Unidirectional Gateway and FLIP products are compatible with a wide variety of anti-virus systems, patch management systems, zero trust, and other systems that provide this second level of defense in defense-in-depth programs.

7) Ensure all connectivity is logged and monitoredWaterfall for IDS is hardware-enforced protection for SPAN port and mirror ports sending data to IT-resident OT intrusion detection system (IDS) sensors. Waterfall is partnered with all the most important OT IDS vendors.

8) Establish an isolation plan – Waterfall’s Unidirectional Gateways are used by TSA-compliant sites and other sites with isolation / islanding requirements. The gateways ensure critical data continues to move, even during “isolation” emergencies where firewalls are not permitted to connect OT with IT networks, or the Internet.

Waterfall’s Unidirectional Gateway, HERA remote access and other hardware-enforced products are dramatically stronger than software and are used routinely at the sensitive IT/OT trust/consequence boundary.

FAQ about the NCSC / CISA “Secure Connectivity Principles for Operational Technology (OT)” guidance

What are the key recommendations from the NCSC / CISA “Secure Connectivity Principles for Operational Technology (OT)” guidance?

The guidance heavily emphasizes a “Push-Only” architecture, where data is sent from the secure OT zone to lower-trust corporate zones, preventing external, unsolicited inbound connections. The guidance recommends unidirectional hardware as a powerful tool to enforce the “push only” rule.

The guidance is for OT asset owners and operators, cybersecurity professionals, integrators and manufacturers and risk managers and engineers – at medium-sized to large industrial sites or enterprises. The guidance is fairly abstract and requires expertise to understand, expertise that is generally not available at the smallest of industrial sites.

The guidance heavily emphasizes a “Push-Only” architecture, where data is sent from the secure OT zone to lower-trust corporate zones, preventing external, unsolicited inbound connections. Unidirectional hardware is a powerful tool to enforce the “push only” rule.

About the author
Picture of Waterfall team

Waterfall team

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

[OK] Row 1: #27754 ADAPTIT S.A. [OK] Row 2: #13384 Alstom [OK] Row 3: #4033 Amitec [OK] Row 4: #4118 AspenTech [OK] Row 5: #4019 Atlantic Data Security [OK] Row 6: #944 AVEVA [OK] Row 7: #20429 AXYS [OK] Row 8: #13392 Calibr8 Systems [OK] Row 9: #33912 Capula Limited [OK] Row 10: #12033 Carahsoft [OK] Row 11: #4112 CyberArk [OK] Row 12: #4124 Cybergym [OK] Row 13: #4109 CyberX [OK] Row 14: #4100 Cylus [OK] Row 15: #4130 Dragos [OK] Row 16: #4045 Ecubix [OK] Row 17: #1080 Emerson [OK] Row 18: #33078 ER-TLC [OK] Row 19: #4060 FIA Integra [OK] Row 20: #4105 Forescout [OK] Row 21: #28170 Fortinet, Inc. [OK] Row 22: #13388 GE Vernova [OK] Row 23: #4040 Help AG [OK] Row 24: #33106 Hopf Vertriebsgesellschaft mbH [OK] Row 25: #4091 Industrial Defender [OK] Row 26: #13169 INTEC S.A. [OK] Row 27: #4053 INTECH [OK] Row 28: #4127 Nozomi Networks [OK] Row 29: #4115 Oracle [OK] Row 30: #26378 Process Safety Solutions [OK] Row 31: #1074 Resec [OK] Row 32: #1065 Schneider Electric [OK] Row 33: #4026 SecuriOT [OK] Row 34: #953 Siemens Energy [OK] Row 35: #11967 SmarterBuild Inc. [OK] Row 36: #33192 Sophlee Limited [OK] Row 37: #4133 Splunk [OK] Row 38: #12003 Technomak [OK] Row 39: #4079 Tenable [OK] Row 40: #4068 Terilogy [OK] Row 41: #1072 Toshiba [OK] Row 42: #4057 Vara [OK] Row 43: #12006 Watchdog Cyber [OK] Row 44: #1078 Yokogawa Electric Done. Total: 44, Updated: 44, Skipped: 0