Zero Trust: Understanding the Identity maturity model
Get practical guidance on maturing the Identity security controls outlined by the Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version 2.0.
Read this paper to understand:
- The guiding principles of the CISA Zero Trust model and its core components
- The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
- Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.