Read this paper to understand:
- The guiding principles of the CISA Zero Trust model and its core components
- The security controls in and related to the Identity pillar of the CISA Zero Trust model, the different stages of maturity for Identity controls, and their characteristics
- Leverage this information to assess your organization’s posture in comparison to the maturity model and the controls within each stage.