Compliance with the CISA Zero Trust Maturity Model

The Cybersecurity & Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April 2023. CISA states that “the maturity model, which includes five pillars and three cross-cutting capabilities, is based on the foundations of Zero Trust. Within each pillar, the maturity model provides specific measures required to achieve traditional, initial, advanced, and optimal Zero Trust Architectures.”

Thales’ solutions can help organizations comply with the CISA Zero Trust Maturity Model2.0 requirements by simplifying compliance and automating security, reducing the burden on security and compliance teams.

Identify and Manage Risks

Gain visibility, control, and insight over risks to sensitive data and assets.

Automate Protection

Protect applications, data, and identities automatically based on policy across hybrid IT.

Mitigate and Respond to Attacks

Monitor for abnormal activities and mitigate attacks in real time.

Thales CISA Zero Trust Maturity Model 2.0

eBook

How Thales helps organizations comply with the CISA Zero Trust Maturity Model 2.0

Thales helps organizations comply with CISA Zero Trust Maturity Model 2.0 with comprehensive cyber security solutions in three key areas of cybersecurity: Application Security, Data Security, and Identity & Access Management. Learn more in our eBook.

What is the CISA Zero Trust Maturity Model 2.0?

CISA’s Zero Trust Maturity Model provides a roadmap that government agencies and private organizations of all kinds use as a reference as they transition towards a zero trust architecture. The maturity model aims to assist organizations in the development of zero trust strategies and implementation plans.

Other key data protection and security regulations

PCI HSM

Global

MANDATE | ACTIVE NOW

The PCI HSM specification defines a set of logical and physical security compliance standards for HSMs specifically for the payments industry. PCI HSM Compliance certification depends on meeting those standards.

DORA

Global

REGULATION | ACTIVE NOW

DORA aims to strengthen the IT security of financial entities to make sure the financial sector in Europe is resilient in the face of the growing volume and severity of cyber-attacks.

Data Breach Notification Laws

Global

REGULATION | ACTIVE NOW

Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.

GLBA

Americas

REGULATION | ACTIVE NOW

The Gramm-Leach-Bliley Act (GLBA)--also known as the Financial Services Modernization Act of 1999--requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data.

Contact a Compliance Specialist

Contact Us