Sponsored: Towards Zero: Protecting critical infrastructure with zero-trust access control
In our increasingly interconnected world, critical infrastructure (power, water, mining, telecommunications, transportation, etc.) has become profoundly vulnerable.
01 July 2025
In our increasingly interconnected world, critical infrastructure (power, water, mining, telecommunications, transportation, etc.) has become profoundly vulnerable. These essential systems are accessed daily by a wide ecosystem of employees, vendors, and contractors. This intersection of digital and physical access requires a flexible, robust solution: Cyber- Physical Access Control (CPAC).
CPAC seamlessly integrates physical security with digital identity, real-time threat intelligence, and automated protective responses, delivering the foundation for secure, Zero-Trust operations across complex environments.
A Zero-Trust CPAC system, in context of telecom base stations, significantly improves traditional access control. It ensures only the right person with verified credentials performs a valid task at the right time and location. Integrated with ticketing, HR, and work assignment systems, it issues Just-In-Time physical biometric access linked to the requester’s digital identity and work tickets, biometrically authenticated on their device. It cross-references access rights, roles, geolocation, biometrics, and behaviour, while a real-time Policy Engine automates policies and enforces compliance.
A major mobile network operator in South Africa presents a compelling example of the transformative power of Zero-Trust CPAC. This real-world case highlights the contrast between existing challenges before deployment and the measurable impact afterwards.
Before CPAC deployment:
Despite having armed response teams, NOC monitoring and access approvals, surveillance systems, and electronic locks, the operator continued to experience persistent issues:
• Excessive volumes of security incidents
• Millions of dollars in financial losses
• No visibility into site visits, the condition of remote sites, or whether assigned work had been completed
After CPAC deployment:
The implementation of a Zero-Trust CPAC solution delivered benefits far beyond improved security, efficiency, cost-savings, and operational control. Key outcomes included: • 96% reduction in incidents:
Security incidents dropped from over 800 per month to approximately 30, significantly reducing fraud and loss.
• 50%+ decrease in contractor charges: Verified proof-of-work and accountability mechanisms led to substantial billing reductions, in some cases exceeding 50%.
• Over 99% reduction in contractor administration overhead: Contractor onboarding and administrative processes, which previously took two days, were reduced to under three minutes through automation.
• Substantial increase in visibility and compliance management: Previously non-existent insights were replaced with full visibility into site access, task compliance, and workforce activity.
• 3-month return on investment: Combined operational efficiencies and cost savings delivered a full return on investment in just three months.
Pivotal to the success of these projects is the effective orchestration and lifecycle management of thousands of user identities, site credentials, electronic lock identities, key identities, asset profiles, and site access request workflows, all enabled through secure, Zero-Trust, low-friction automation. “Implementing robust CPAC in critical environments comes with its challenges: outdated legacy systems, fragmented identity silos, and complex workflows that demand phased and strategic modernisation,” says Adarbad Master, CTO of iCrypto Inc.
“Delivering on the promise of Zero-Trust and Just-In-Time biometric access—automated, seamless, and user-friendly—is easier said than done. Especially when the system must intelligently manage thousands of user and device identities without manual administrative oversight,” adds Zane Renou, VP of iCrypto Inc.
“Our extensive experience proves that adopting Zero-Trust CPAC isn’t merely a security solution—it’s a critical imperative. It is a strategic enabler of operational excellence, cost control, and digital transformation across critical infrastructure environments.” By embracing Zero-Trust CPAC, enterprises build intelligent, resilient, and strategic layers of defence.
It’s time to move beyond outdated, siloed security. Protecting assets now demands a unified approach, seamlessly integrating digital and physical security to create a truly resilient foundation, while also enabling secure digital transformation and the convergence of OT and IT systems.