Zero Trust: Understanding the Identity maturity model


Get practical guidance on maturing the Identity security controls outlined by the Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model Version 2.0.

Read this paper to understand:

  • The guiding principles of the CISA Zero Trust model and its core components
  • The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
  • Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.
Okta Public Sector ZT2.0 TA 051524

Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By clicking the "Submit" button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms.