Zero Trust Maturity Model
Zero Trust Maturity Model | CISA
CISA’s Zero Trust Maturity Model is one of many roadmaps that agencies can reference as they transition towards a zero trust architecture. The maturity model aims to assist agencies in the development of zero trust strategies and implementation plans and to present ways in which various CISA services can support zero trust solutions across agencies.
The maturity model, which includes five pillars and three cross-cutting capabilities, is based on the foundations of zero trust. Within each pillar, the maturity model provides specific examples of traditional, initial, advanced, and optimal zero trust architectures.
A Recognized Leader in Zero Trust Edge
Zero Trust - Palo Alto Networks
The security operations center: an essential function
When building a Zero Trust Enterprise, the main role of the security operations center (SOC) is to provide an additional layer of verification to further reduce risk. By continuously monitoring all activity for signs of anomalous or malicious intent – using analytics, artificial intelligence, automation and human analysis – the SOC provides an audit point for earlier trust decisions and can override them if necessary. With a wider view of the entire infrastructure, the SOC has the ability to discover things that would normally go undetected. Download the e-book to learn more about the role of the SOC.