MindMaps

Zero Trust Maturity Mind Maps

Zero Trust Maturity Mind Map

Reference:  Evolving Zero Trust – Microsoft Position Paper.

Ever since the term Zero Trust came out regarding cyber security, manufacturers, partners, and professionals have provided a range of perspectives.  Some manufacturers provide Zero Trust to one specific area like identity or devices.  Some businesses may view Zero Trust as something to buy off the shelf.

The reality, however, is that Zero Trust is a process or strategy if you will. It is also a moving target in the since that, with recent technologies and approaches, the ability to achieve Zero Trust is always ongoing.

In this context Microsoft takes the following approach to Zero Trust.  First, we look at three major principles.

  • Verify Explicitly
  • Least Privilege Access
  • Assume Breach

Second, we look at six major pillars where Zero Trust needs to be applied. These pillars are all interconnected and make up an IT ecosystem and are applied to on-premises and multi-cloud environments.

  • Identity
  • Endpoint/Devices
  • Apps
  • Data
  • Infrastructure
  • Network

Lastly, there is a set of Zero Trust Policies that run throughout the six pillars.

  • Policy Enforcement
  • Threat Protection

Because this is comprehensive and covers an IT ecosystem, Zero Trust needs to be looked at from a maturity level rather than from a point solution or a set of solutions.

The mind map models in this section cover three maturity models, Basic/Getting Started, Advanced, and Optimal.  Each model has a link that explains the six pillars and how they relate to a maturity level for each model.

Because we look at this from a maturity standpoint, the question is not if businesses are doing Zero Trust, most are doing some portion, but how mature are they in the Zero Trust process and at what level within each pillar.

By taking this approach, security professionals can look at the environment and determine the gaps and how to address them.

We hope these models help to clarify what it means to have Zero Trust within a business and empower security teams to build a solid Zero Trust foundation.

Jeff Van Gundy TS-Security, Microsoft 
Jeff Van Gundy, CISSP | LinkedIn

“Most businesses aren’t in the business of security, but security can help them stay in business.”

All material is based and derived from  Evolving Zero Trust – Microsoft Position Paper.

Download the Basichttps://cybergeeks.cloud/wp-content/uploads/2023/03/Zero-Trust-Maturity_Basic.pdf

Download the Advancedhttps://cybergeeks.cloud/wp-content/uploads/2023/03/Zero-Trust-Maturity_Advanced.pdf

Download the Optimal https://cybergeeks.cloud/wp-content/uploads/2023/03/Zero-Trust-Maturity_Optimal.pdf

Tiago Souza

Tiago Souza

Security Technical Specialist
Cyber Security Technical Specialist at Microsoft | Cloud Security & Threat Protection | Blog content creator at CyberGeeks.Cloud - https://linktr.ee/tiagovf