Zero Trust: Understanding the Identity maturity model

Get practical guidance on maturing the Identity security controls outlined by the
Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version
2.0.

Read this paper to understand:

  • The guiding principles of the CISA Zero Trust model and its core components
  • The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
  • Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.

Preview image
Sponsored by

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this content is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information and other information you have provided to us with content sponsors.