Get practical guidance on maturing the Identity security controls outlined by the Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version 2.0.
Read this paper to understand:
- The guiding principles of the CISA Zero Trust model and its core components
- The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
- Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.