Zero Trust: Understanding the Identity maturity model

Get practical guidance on maturing the Identity security controls outlined by the Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version 2.0.

Read this paper to understand:

  • The guiding principles of the CISA Zero Trust model and its core components
  • The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
  • Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.
thumbnail

Download the whitepaper

By submitting, I agree to the processing and international transfer of my personal data by Okta as described in the Privacy Policy.