From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Exploring CISA’s Zero Trust Maturity Model (ZTMM)
From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Exploring CISA’s Zero Trust Maturity Model (ZTMM)
- [Instructor] You can think of zero trust, like building a secure high tech city, but you can't build the whole thing overnight. You need a city plan that breaks it into zones. Residentials, commercials, utilities, and defines how security should evolve in each area. That's what CISA zero trust maturity model does. It gives you a blueprint broken into five zones, or pillars like identity, devices, network, apps, and our data, and it shows you how secure each zone is, using three stages of maturity. Think of your organization as a secure campus. To protect it effectively, you need to control different zones, each with its own access, rules, and protection. Now let's walk through these five zones. Identity is like the campus ID system, verifying who's allowed in, is this a student, staff member, or a visitor? Next is devices, which are the badges and equipment they carry. Are they approved and secure or are they jailbroken…