Chapter 6

Understanding Zero Trust Maturity

At this point it is expected that, as the consultant, Glenn has had the chance to speak to the key leads in the enterprise and identified some pain points and performance metrics that align with the overall mission statement. The next step is to gauge the existing maturity of the network and map out the threats, assets, and important cost considerations that can impact the environment and subsequently the business. This is an important step because it helps build metrics and tactical strategies for the enterprise to pursue as part of the overall Zero Trust vision.

The most common framework used to measure Zero Trust maturity is the second version of the Cybersecurity and Infrastructure Security Agency ...

Get In Zero Trust We Trust now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.