https://www.techtarget.com/searchsecurity/tip/An-overview-of-the-CISA-Zero-Trust-Maturity-Model
Zero trust is a rigorous approach to security that presumes no user, device or network is trustworthy. The principal benefit of a zero-trust policy is that it blocks any attempt to access internal IT infrastructure resources without proper and continuous authentication. Adding zero trust to any IT environment ensures it delivers a completely secure and impenetrable barrier to unauthorized access attempts.
First introduced as a discussion document in June 2021, the U.S. Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model aims to help organizations in their transition to zero trust.
The model supports and conforms to requirements specified in Executive Order 14028: Improving the Nation's Cybersecurity, which notes that the U.S. "faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people's security and privacy. The federal government must improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors."
CISA's Zero Trust Maturity Model provides a framework for organizations in the public and private sectors to strengthen their efforts to prevent unauthorized access to their technology infrastructures and information resources via zero trust.
The DHS document lists the following seven foundational rules of zero trust as defined in the NIST Special Publication (SP) 800-207 (2020), Zero Trust Architecture:
The executive order calls for government agencies to develop migration plans toward zero-trust security environments for technology infrastructures. The CISA Zero Trust Maturity Model is one of the approaches to the achievement of zero trust, which the model document acknowledges may take time to implement.
The graphic below depicts an example of a software-defined perimeter (SDP) with zero trust. In this example, an SDP controller manages all user and device verification and authentication activities before permitting a connection to be established with internal network and IT resources. The SDP creates a zero-trust wall around the internal network asset, preventing all access attempts except those that have been fully authenticated.
Acknowledging that the transition to a zero-trust environment will take time and investment, the Maturity Model recommends a three-stage approach to zero trust:
Each stage contributes to the overall progression to a strong and secure zero-trust architecture that complies with the five pillars in the CISA Zero Trust Maturity Model: identity, device, network/environment, application workload and data.
The figure above shows the progression from a traditional zero-trust approach through to an optimal zero-trust environment. The model envisions organizations making incremental changes and improvements across all five pillars of the model over time toward an optimized state.
Each pillar also has elements and specifications regarding visibility and analytics, automation and orchestration, and governance. Each of these three layers ensures zero-trust activities address these important elements throughout the transition to an optimized environment.
The current version of the CISA Zero Trust Maturity Model, when released in 2021, was largely for review and comment. An updated version, 2.0, had been rumored for midyear 2022. It is expected to include enhancements to the five pillars and their characteristics, as well as guidance for organizations to move forward on their zero-trust development activities.
12 Oct 2022