CISA Zero Trust Maturity Model
CISA Zero Trust Maturity Model for federal agencies
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (6)
CISA Zero Trust Maturity Model: Access Control & Identity
Managing access to information systems (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-01 | Account management and provisioning |
| CISA-ZT-02 | Access enforcement and least privilege |
| CISA-ZT-03 | Multi-factor authentication requirements |
| CISA-ZT-04 | Remote access controls |
| CISA-ZT-05 | Wireless access restrictions |
| CISA-ZT-06 | Identity proofing and verification |
CISA Zero Trust Maturity Model: Audit & Accountability
Audit logging and accountability measures (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-28 | Audit event logging and storage |
| CISA-ZT-29 | Audit record review and analysis |
| CISA-ZT-30 | Time synchronization |
| CISA-ZT-31 | Audit log protection and retention |
| CISA-ZT-32 | Accountability and non-repudiation |
CISA Zero Trust Maturity Model: Configuration Management
Managing system configurations securely (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-23 | Baseline configuration establishment |
| CISA-ZT-24 | Configuration change control |
| CISA-ZT-25 | Security impact analysis |
| CISA-ZT-26 | System component inventory |
| CISA-ZT-27 | Software usage restrictions |
CISA Zero Trust Maturity Model: Incident Response
Detecting and responding to security incidents (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-18 | Incident response planning and testing |
| CISA-ZT-19 | Incident handling and containment |
| CISA-ZT-20 | Incident reporting and notification |
| CISA-ZT-21 | Forensic analysis capabilities |
| CISA-ZT-22 | Lessons learned and improvement |
CISA Zero Trust Maturity Model: Risk Assessment & Management
Identifying and managing cybersecurity risks (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-13 | Risk assessment procedures |
| CISA-ZT-14 | Vulnerability scanning and management |
| CISA-ZT-15 | Security categorization |
| CISA-ZT-16 | Threat intelligence integration |
| CISA-ZT-17 | Continuous monitoring strategy |
CISA Zero Trust Maturity Model: System & Communications Protection
Protecting systems and communications (CISA Zero Trust Maturity Model)
| Code | Title |
|---|---|
| CISA-ZT-07 | Boundary protection and segmentation |
| CISA-ZT-08 | Cryptographic protection of data |
| CISA-ZT-09 | Denial-of-service protection |
| CISA-ZT-10 | Transmission confidentiality and integrity |
| CISA-ZT-11 | Session management controls |
| CISA-ZT-12 | Network monitoring and defense |
Maps to 519 other frameworks
Frequently Asked Questions
What is CISA Zero Trust Maturity Model?
CISA Zero Trust Maturity Model is a compliance framework from United States with 6 domains and 32 controls. CISA Zero Trust Maturity Model for federal agencies It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CISA Zero Trust Maturity Model have?
CISA Zero Trust Maturity Model has 32 controls organised across 6 domains. The largest domains are CISA Zero Trust Maturity Model: Access Control & Identity (6 controls), CISA Zero Trust Maturity Model: System & Communications Protection (6 controls), CISA Zero Trust Maturity Model: Audit & Accountability (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CISA Zero Trust Maturity Model map to?
CISA Zero Trust Maturity Model maps to 519 other compliance frameworks. The top mapping partners are Azure Security Benchmark (63% coverage), BSI IT-Grundschutz (63% coverage), ANSSI Cybersecurity Framework (63% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with CISA Zero Trust Maturity Model compliance?
Start your CISA Zero Trust Maturity Model compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CISA Zero Trust Maturity Model requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 32 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required