Zero Trust: Understanding the Identity maturity model
Get practical guidance on maturing the Identity security controls outlined by the
Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version
2.0.
Read this paper to understand:
The guiding principles of the CISA Zero Trust model and its core components
The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.