Zero Trust Maturity Matters: Modeling Cyber Security Focus Areas and Maturity Levels in the Zero Trust Principle

Publication date

DOI

Document Type

Master Thesis

Collections

Open Access logo

License

CC-BY-NC-ND

Abstract

Society is getting more dependent from information technologies - which means that the Confidentiality, Integrity and Availability (CIA) must be guaranteed -, thus the cybersecurity of information systems needs to be improved. At the current date, the complexity of networks has increased exponentially. On top of that, networks will keep extending well outside the controllable borders of enterprises. To solve this problem, enterprises must start letting go of Trust but Verify and start embracing the Zero Trust principle. This research created a Zero Trust Maturity Model (ZeTuMM) that enterprises should use to start with the Zero Trust principles implementations, as well as grow in their Zero Trust maturity. After testing this model at various companies, this research serves as a road sign to continue the work on Zero Trust cybersecurity.

Keywords

Zero Trust, Maturity Model, Cybersecurity, Cyber Security, Information Security, Focus Areas

Citation