Understanding Zero Trust Maturity Models: We Compare the 3 Main Approaches

Need help understanding Zero Trust Maturity Models?

In today’s rapidly evolving cyber threat landscape, organisations can no longer rely on traditional perimeter-based defences. The concept of Zero Trust—“never trust, always verify”—has become the cornerstone of modern cybersecurity strategies. To help organisations adopt and measure progress in Zero Trust, several UK and US government agencies have developed Zero Trust maturity models, each offering unique perspectives and frameworks. The three most influential are from the Department of Defense (DoD), the Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA).

This article explores these models in depth, highlighting their pillars, maturity stages, and practical implications for organisations seeking to strengthen their cybersecurity posture.

What is Zero Trust?

Zero Trust is a security model that assumes threats can originate both inside and outside the network. Instead of granting implicit trust based on location or credentials, Zero Trust requires continuous verification, least-privilege access, and granular enforcement of security policies. The goal is to minimise the attack surface, prevent lateral movement, and ensure that only authorised users and devices can access sensitive resources.

Department of Defense (DoD) Zero Trust Maturity Model

The DoD Zero Trust Strategy and Reference Architecture provides a comprehensive roadmap for implementing Zero Trust across the defence enterprise. Released in 2022 and updated through subsequent directives, the DoD model emphasises cultural adoption, technical acceleration, and enterprise-wide enablement.

Key Pillars

The DoD identifies seven pillars of Zero Trust:

  1. User – Continuous authentication and conditional access.
  2. Device – Uniform device hygiene and compliance.
  3. Application & WorkloadSegmentation and secure application deployment.
  4. Data – Encryption, tagging, and data-centric protections.
  5. Network & Environment – East-west segmentation, VPN-less access.
  6. Visibility & Analytics – AI-driven monitoring and anomaly detection.
  7. Automation & Orchestration – Dynamic policy enforcement and centralised orchestration.

Maturity Approach

The DoD maturity model is less about rigid stages and more about capability adoption across pillars. Each pillar has defined capabilities, ranging from basic controls (like multi-factor authentication) to advanced measures (like dynamic, continuous authorisation). The DoD roadmap sets a target of full Zero Trust implementation by 2027, with milestones for cultural adoption, technology deployment, and synchronisation across components. A detailed overview of the DOD's Zero Trust Execution Roadmap can be found here.

Strategic Goals

  • Cultural Adoption – Training personnel to embrace Zero Trust principles.
  • Secured Systems – Integrating Zero Trust into both legacy and new systems.
  • Technology Acceleration – Deploying cutting-edge tools at pace with industry.
  • Enablement – Aligning funding, policies, and processes with Zero Trust.

CISA Zero Trust Maturity Model

The CISA Zero Trust Maturity Model (ZTMM), first released in 2021 and updated to Version 2.0 in 2022, provides a structured roadmap for federal civilian agencies but is widely adopted across industries.

Five Pillars

CISA organises Zero Trust into five protection areas:

  1. Identity – Strong authentication and lifecycle management.
  2. Devices – Secure, compliant devices across the enterprise.
  3. Networks – Segmentation, monitoring, and secure communications.
  4. Applications & Workloads – Secure development and workload isolation.
  5. Data – Encryption, tagging, and access control.

To illustrate its Zero Trust Maturity Model Pillars CISA provides the following image:

CISA Zero Trust Maturity Model Pillars
CISA Zero Trust Maturity Model Pillars

Cross-Cutting Capabilities

  • Visibility & Analytics
  • Automation & Orchestration
  • Governance

Four Maturity Stages

CISA defines four stages of maturity:

  1. Traditional – Perimeter-based, siloed security.
  2. Initial – Early automation, least-privilege strategies, and visibility.
  3. Advanced – Centralised identity, integrated policy enforcement, near real-time risk assessments.
  4. Optimal – Fully automated lifecycle management, dynamic just-in-time (JIT) and just-enough-access (JEA), continuous monitoring.

CISA Zero Trust Maturity Model High Level Overview

Practical Use

CISA’s model is highly prescriptive, offering agencies a way to assess current posture, identify gaps, and plan incremental improvements. It aligns with federal mandates like OMB M-22-09, making it a benchmark for compliance and modernisation.

NSA Zero Trust Maturity Guidance

The NSA Zero Trust maturity guidance takes a more technical, pillar-specific approach. Rather than a single overarching model, the NSA publishes Cybersecurity Information Sheets (CSIs) that provide detailed recommendations for maturing specific pillars.

Pillar-Specific Guidance

NSA focuses on advancing maturity across seven pillars, similar to DoD:

  • User Pillar – Continuous identity verification.
  • Device Pillar – Secure device management.
  • Network & Environment Pillar – Segmentation, data flow mapping, software-defined networking.
  • Data Pillar – Catalogue, encryption, granular access control, monitoring.
  • Application & Workload Pillar – Secure coding and workload isolation.
  • Visibility & Analytics Pillar – Real-time anomaly detection.
  • Automation & Orchestration Pillar – Integrated, automated policy enforcement.

Maturity Recommendations

NSA guidance emphasises:

  • Micro-segmentation to contain adversarial lateral movement.
  • Granular data attributes for access control.
  • Continuous monitoring to detect anomalous activity.
  • Interoperability to ensure secure data sharing across organisations.

Unlike CISA’s staged model, NSA’s approach is modular and technical, offering actionable steps for organisations to mature specific capabilities depending on their risk profile.

Comparing the Models

AgencyFocusStructureMaturity StagesUnique Features
DoDEnterprise-wide defence adoption7 pillarsCapability-driven, FY2027 roadmapCultural adoption, military-grade use cases
CISAFederal civilian agencies, industry5 pillars + 3 cross-cuttingTraditional → Optimal (4 stages)Prescriptive, compliance-aligned
NSATechnical, pillar-specific7 pillarsModular guidanceDeep technical recommendations, CSIs

Conclusion

Zero Trust is no longer optional—it is the foundation of modern cybersecurity. The DoD, CISA, and NSA maturity models each provide valuable frameworks:

  • DoD emphasises cultural adoption and enterprise-wide enablement.
  • CISA offers a staged roadmap for agencies to measure progress.
  • NSA delivers technical, pillar-specific guidance to counter advanced threats.

Organisations should not view these models as competing but rather as complementary. Together, they provide a holistic blueprint for achieving Zero Trust maturity—balancing strategy, compliance, and technical depth.

By leveraging these models, enterprises can build resilient architectures that withstand evolving adversary tactics, protect sensitive data, and enable secure collaboration in an increasingly interconnected world.

Node Types
Zero Trust
Current Insight
Zero Trust
Challenge
Zero Trust
Role
Zero Trust
Initiative/Theme

Map Options

Node types
Link types
Connectivity

With over 25 years of experience delivering complex, high-value cybersecurity, infrastructure, and transformation programmes across global financial services and insurance sectors - Rob is recognised for delivering secure, scalable, and audit-ready solutions that not only protect enterprise assets but also enable business growth and resilience.Through his insights, Rob shares how to build resilient cyber strategies, navigate digital transformation, and lead organisations through the challenges of today’s rapidly evolving threat landscape. His writing blends practical experience with strategic foresight, offering actionable guidance on strengthening security postures while driving innovation

Leave a Reply