As OT environments become increasingly dynamic, industries with OT systems are facing more cyberthreats than ever, most still coming from non-OT-targeted threats. To protect against these threats, organizations should implement the principles of Zero Trust for a resilient OT security framework, including endpoint security, network segmentation, strong incident response plans, and secure remote access.