• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Check Out CISA’s Updated Zero Trust Guidance

CISA's updated Zero Trust Maturity Model helps organizations strengthen their posture regardless of their starting point.

April 11, 2023 Zachary Comeau Leave a Comment

Zero Trust, ZTNA, Netskope
stock.adobe.com/Alexander

The U.S. Cybersecurity and Infrastructure Security Agency has released an updated version of its Zero Trust Maturity Model, which bolsters the agency’s zero trust standards with input from a public comment period.

While designed for federal agencies, any organization can review the guidance and apply the protections to their infrastructure to help keep malicious actors out of their networks and devices by implementing the principle of least privilege and authenticating identities and users.

The updated guidance essentially considers the reality that not every organization begins their zero-trust journey from the same starting point. The new version of the Zero Trust Maturity Model includes a new stage called “Initial” that can be used as a guide to identify maturity for each pillar, the agency says.

CISA also added several new functions and updated existing functions in all four stages of maturity (Traditional, Initial, Advanced and Optimal) to consider when organizations plan and make decisions for zero trust implementation.

Read Next: Your Guide to Implementing a Zero Trust Network Architecture

The updates to CISA’s zero trust guidance come as a result of the 2021 public comment period, and the agency also published its response to those comments and summarizes the comments and modifications made from that input.

According to CISA, the updated model provides a gradient of implementation across five zero trust pillars (identity, devices, networks, applications & workloads, and data) to facilitate implementation and help organizations make minor advancements over time.

“CISA has been acutely focused on guiding agencies, who are at various points in their journey, as they implement zero trust architecture,” says Chris Butera, CISA’s technical director for cybersecurity, in a statement. “As one of many roadmaps, the updated model will lead agencies through a methodical process and transition towards greater zero trust maturity.”

Butera reiterates that the Zero Trust Maturity Model is intended for federal civilian agencies, but all organizations can review the document to guide them on their zero-trust journey.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: CISA, Cybersecurity, Zero Trust

Related Content:

  • AI Automation burnout What is It About AI That Brings Excitement,…
  • A woman on a videoconference call, AI, videoconferencing AI’s Revolutionary Impact on the Videoconferencing Experience
  • People using Jabra videobar with Microsoft Intelligent Speaker feature. Jabra Integrates Microsoft Intelligent Speaker Feature in its…
  • Shure logo Shure Microflex Advance MXA920 & MXA902 Receive Google…

Free downloadable guide you may like:

  • Creating Great User Experience and Ultimate Flexibility with Clickshare

    Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When designing the office spaces – and meeting spaces in particular – enabling that connection between co-workers is crucial. Introducing the right collaboration technology in meeting spaces is the biggest challenge for IT managers […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Advertise with Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSDO NOT SELL MY PERSONAL INFORMATIONTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.