Description
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Attached.
1
CISA’s Zero Trust Maturity Model: In-Depth Analysis
Author name
Institutional affiliation
Course number and name
Instructor name
Assignment due date
2
CISA’s Zero Trust Maturity Model: In-Depth Analysis
Events Leading to the Development of the Zero Trust Model
The Model was designed to address the new generation of cyber threats and some of the
drawbacks of earlier security frameworks. Classically, to protect the network from threats,
several barriers like firewalls and VPNs were used to safeguard the internal user and systems,
which it was presumed could be relied on (National Institute of Standards and Technology
2020). However, several events and a trend pointed to the shortcomings of this approach. The
evolution of APTs, which may be conducted by state-sponsored actors or significant and
coordinated cyber-criminal gangs showed that even the most basic access defenses could be
penetrated and that attackers could exist unaware in trusted environments. Insider threat, as
demonstrated by malicious insiders or stolen credentials, vividly showed that internal actors
should not be assumed harmless.
Furthermore, using remote work and personal devices further weakened the clear network
perimeters that more traditional perimeter security could address. Recent cyberattacks like the
SolarWinds attack and OPM data breach brought to the fore the risk in trusted networks and
wrong assumptions that were characteristic of previous years (Muhammad et al., 2022). In record
to these challenges, the principle of Zero Trust was first established by Forrester Research in
2010. This occurred with the relea...
