Zero Trust Maturity Model (ZTMM) Controls Guide
This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.
The full ZTMM Controls Guide contains guidance for each of the five pillars identified by CISA for Zero Trust Maturity. This summary version focuses on the first pillar: Identity
What You’ll Learn:
- How to assess and elevate your identity maturity across four levels.
- Identity controls objectives to work towards for your use case.
- Identity authentication technologies and capabilities to focus on to level up your organizations’ maturity.
Who It’s For: Security leaders, architects, and GRC professionals looking to:
- Align with CISA’s ZTMM framework
- Demonstrate maturity using NIST 800-171 controls
- Build a scalable foundation for Zero Trust
Request your free content download
Find similar resources
Zero Trust: A Step-by-Step Guide

Zero Trust Network Access Market Guide
Incident Briefing: Coinbase Discloses Breach of Customer Data
On May 15, 2025, the cryptocurrency exchange Coinbase disclosed that it had been the victim of an extortion attempt following a breach of customer data. Coinbase stated that prior to receiving the extortion demand, it had independently discovered unauthorized access of customer data by “overseas support agents” using internal monitoring systems.
