CISA ZTMM 2.0 · NIST SP 800-207

Zero Trust is not a product.
It's a strategy.

Zero Trust eliminates implicit trust from every layer of your environment — network, device, app, and data. Identity is the control plane that makes it possible.

CISA ZTMM framework

The five pillars of Zero Trust

CISA defines Zero Trust across five capability areas. Each pillar has four maturity stages — Traditional, Initial, Advanced, and Optimal.

👤

Identity

Verify every user, every time — with adaptive, risk-based authentication.

💻

Devices

Enforce device trust at login — only compliant, managed devices get access.

🌐

Networks

Eliminate implicit trust from the network layer. Move to identity-defined perimeters.

📱

Applications

Govern access to every app — on-prem, SaaS, and custom — from a single policy engine.

🗄️

Data

Protect data with attribute-based access control and identity-aware DLP integrations.

Free · 5 minutes

Where does your organization stand?

Our free assessment maps to the CISA Identity pillar (Table 2)—seven functions, four maturity stages—and delivers a personalized Okta-aligned roadmap.

Take the free assessment