IdentityGate · Zero Trust Tool

Zero Trust Readiness Assessment

Evaluate your organization across the 6 CISA Zero Trust maturity domains. Know where you stand before you build. This confidential self-assessment delivers a maturity rating and recommended next steps in under 15 minutes.

IdentityGate Assessment

6 CISA Domains

Identity

4

Devices

4

Networks

4

Applications

2

Data

2

Visibility & Analytics

1

Total Score

Initial Tier

17 / 30

IdentityGate · Zero Trust Tool

Zero Trust Readiness Assessment

Evaluate your organization across the 6 CISA Zero Trust maturity domains. Know where you stand before you build. This confidential self-assessment delivers a maturity rating and recommended next steps in under 15 minutes.

IdentityGate Assessment

6 CISA Domains

Identity

4

Devices

4

Networks

4

Applications

2

Data

2

Visibility & Analytics

1

Total Score

Initial Tier

17 / 30

IdentityGate · Zero Trust Tool

Zero Trust Readiness Assessment

Evaluate your organization across the 6 CISA Zero Trust maturity domains. Know where you stand before you build. This confidential self-assessment delivers a maturity rating and recommended next steps in under 15 minutes.

IdentityGate Assessment

6 CISA Domains

Identity

4

Devices

4

Networks

4

Applications

2

Data

2

Visibility & Analytics

1

Total Score

Initial Tier

17 / 30

Microsoft Gold Partner

HIPAA Compliant Deployments

SOX / FFIEC

Aligned

SOC 2

Practices

100+ Clients Managed

Microsoft Gold Partner

HIPAA Compliant Deployments

SOX / FFIEC Aligned

SOC 2 Practices

100+ Clients Managed

Microsoft Gold Partner

HIPAA Compliant Deployments

SOX / FFIEC Aligned

SOC 2 Practices

100+ Clients Managed

How to Use This Assessment

This assessment evaluates your organization across the 6 domains of the CISA Zero Trust Maturity Model. For each domain, rate your organization on a scale of 1 to 5 based on the criteria described. Your total score provides a maturity rating with recommended next steps.

Scoring Scale

1

Traditional

Manually configured, static security policies with no Zero Trust principles applied

2

Initial

Some automation and policy enforcement beginning, but largely perimeter-focused

3

Advanced

Automated controls with some cross-pillar coordination and continuous verification

4

Optimal

Fully automated, dynamic policies with real-time risk-based access decisions

5

Mature

Continuous optimization with AI-driven analytics, full integration, and adaptive controls

Instructions: For each domain on the following pages, read the criteria carefully and write the score (1-5) that best describes your organization today. Be honest. This assessment is most valuable when it reflects your current state, not your planned state.

How to Use This Assessment

This assessment evaluates your organization across the 6 domains of the CISA Zero Trust Maturity Model. For each domain, rate your organization on a scale of 1 to 5 based on the criteria described. Your total score provides a maturity rating with recommended next steps.

Scoring Scale

1

Traditional

Manually configured, static security policies with no Zero Trust principles applied

2

Initial

Some automation and policy enforcement beginning, but largely perimeter-focused

3

Advanced

Automated controls with some cross-pillar coordination and continuous verification

4

Optimal

Fully automated, dynamic policies with real-time risk-based access decisions

5

Mature

Continuous optimization with AI-driven analytics, full integration, and adaptive controls

Instructions: For each domain on the following pages, read the criteria carefully and write the score (1-5) that best describes your organization today. Be honest. This assessment is most valuable when it reflects your current state, not your planned state.

How to Use This Assessment

This assessment evaluates your organization across the 6 domains of the CISA Zero Trust Maturity Model. For each domain, rate your organization on a scale of 1 to 5 based on the criteria described. Your total score provides a maturity rating with recommended next steps.

Scoring Scale

1

Traditional

Manually configured, static security policies with no Zero Trust principles applied

2

Initial

Some automation and policy enforcement beginning, but largely perimeter-focused

3

Advanced

Automated controls with some cross-pillar coordination and continuous verification

4

Optimal

Fully automated, dynamic policies with real-time risk-based access decisions

5

Mature

Continuous optimization with AI-driven analytics, full integration, and adaptive controls

5

Optimized

Continuous improvement via metrics and automation.

Instructions: For each domain on the following pages, read the criteria carefully and write the score (1-5) that best describes your organization today. Be honest. This assessment is most valuable when it reflects your current state, not your planned state.

Rate Your Organization Across

all 6 CISA Domains

Rate Your Organization Across

all 6 CISA Domains

Rate Your Organization Across

all 6 CISA Domains

Score each domain from 1 to 5. Microsoft technology recommendations are listed at the bottom of each domain card.

Score each domain from 1 to 5. Microsoft technology recommendations are listed at the bottom of each domain card.

0 of 6 completed
0/ 30
01
Identity
Not scored
02
Devices
Not scored
03
Networks
Not scored
04
Applications
Not scored
05
Data
Not scored
06
Visibility and Analytics
Not scored

RESULT

Scoring and Interpretation

Your total score maps to one of four Zero Trust maturity tiers. Each tier comes with a specific interpretation and recommended engagement type.

6-12

Traditional

Perimeter-based security, minimal Zero Trust

Your organization operates on perimeter-based security with minimal Zero Trust principles. Identity is a significant attack surface. Recommend a Zero Trust maturity assessment and architecture design engagement to establish a roadmap.

13-18

Initial

Some foundations in place, significant gaps remain

Some Zero Trust foundations are in place but significant gaps remain. Most organizations at this level have MFA deployed inconsistently and lack privileged access management. Recommend targeted implementations in identity governance and conditional access.

19–24

Advanced

Solid progress, cross-pillar coordination developing

Solid Zero Trust progress with cross-pillar coordination developing. Focus on closing gaps in microsegmentation, data protection, and analytics to reach full maturity.

25-30

Optimal / Mature

Well-developed architecture, focus on optimization

Your Zero Trust architecture is well-developed. Focus on continuous optimization, emerging capabilities (AI-driven analytics, passwordless), and maintaining operational excellence across all six domains.

RESULT

Scoring and Interpretation

Your total score maps to one of four Zero Trust maturity tiers. Each tier comes with a specific interpretation and recommended engagement type.

6-12

Traditional

Perimeter-based security, minimal Zero Trust

Your organization operates on perimeter-based security with minimal Zero Trust principles. Identity is a significant attack surface. Recommend a Zero Trust maturity assessment and architecture design engagement to establish a roadmap.

13-18

Initial

Some foundations in place, significant gaps remain

Some Zero Trust foundations are in place but significant gaps remain. Most organizations at this level have MFA deployed inconsistently and lack privileged access management. Recommend targeted implementations in identity governance and conditional access.

19–24

Advanced

Solid progress, cross-pillar coordination developing

Solid Zero Trust progress with cross-pillar coordination developing. Focus on closing gaps in microsegmentation, data protection, and analytics to reach full maturity.

25-30

Optimal / Mature

Well-developed architecture, focus on optimization

Your Zero Trust architecture is well-developed. Focus on continuous optimization, emerging capabilities (AI-driven analytics, passwordless), and maintaining operational excellence across all six domains.

RESULT

Scoring and Interpretation

Your total score maps to one of four Zero Trust maturity tiers. Each tier comes with a specific interpretation and recommended engagement type.

6-12

Traditional

Perimeter-based security, minimal Zero Trust

Your organization operates on perimeter-based security with minimal Zero Trust principles. Identity is a significant attack surface. Recommend a Zero Trust maturity assessment and architecture design engagement to establish a roadmap.

13-18

Initial

Some foundations in place, significant gaps remain

Some Zero Trust foundations are in place but significant gaps remain. Most organizations at this level have MFA deployed inconsistently and lack privileged access management. Recommend targeted implementations in identity governance and conditional access.

19–24

Advanced

Solid progress, cross-pillar coordination developing

Solid Zero Trust progress with cross-pillar coordination developing. Focus on closing gaps in microsegmentation, data protection, and analytics to reach full maturity.

25-30

Optimal / Mature

Well-developed architecture, focus on optimization

Your Zero Trust architecture is well-developed. Focus on continuous optimization, emerging capabilities (AI-driven analytics, passwordless), and maintaining operational excellence across all six domains.

Priority Actions by Domain

These are the specific actions to take immediately in each domain where your score indicates Traditional or Initial maturity.

Identity

Deploy Entra ID with MFA on all resources, establish identity lifecycle automation, and implement basic RBAC.

Devices

Enroll all endpoints in Intune, define compliance policies, and integrate device health with conditional access.

Networks

Segment critical workloads from general network, encrypt internal traffic, and plan microsegmentation roadmap.

Applications

Deploy SSO for all applications, implement app proxy for legacy apps, and begin managing workload identities.

Data

Establish data classification taxonomy, deploy sensitivity labels, and configure DLP for email and file sharing.

Visibility

Deploy Microsoft Sentinel, configure identity detection rules, and establish baseline monitoring and alerting.

Priority Actions by Domain

These are the specific actions to take immediately in each domain where your score indicates Traditional or Initial maturity.

Identity

Deploy Entra ID with MFA on all resources, establish identity lifecycle automation, and implement basic RBAC.

Devices

Enroll all endpoints in Intune, define compliance policies, and integrate device health with conditional access.

Networks

Segment critical workloads from general network, encrypt internal traffic, and plan microsegmentation roadmap.

Applications

Deploy SSO for all applications, implement app proxy for legacy apps, and begin managing workload identities.

Data

Establish data classification taxonomy, deploy sensitivity labels, and configure DLP for email and file sharing.

Visibility

Deploy Microsoft Sentinel, configure identity detection rules, and establish baseline monitoring and alerting.

Priority Actions by Domain

These are the specific actions to take immediately in each domain where your score indicates Traditional or Initial maturity.

Identity

Deploy Entra ID with MFA on all resources, establish identity lifecycle automation, and implement basic RBAC.

Devices

Enroll all endpoints in Intune, define compliance policies, and integrate device health with conditional access.

Applications

Deploy SSO for all applications, implement app proxy for legacy apps, and begin managing workload identities.

Networks

Segment critical workloads from general network, encrypt internal traffic, and plan microsegmentation roadmap.

Data

Establish data classification taxonomy, deploy sensitivity labels, and configure DLP for email and file sharing.

Visibility

Deploy Microsoft Sentinel, configure identity detection rules, and establish baseline monitoring and alerting.

Ready To Build Your Zero Trust Architecture?

Your assessment reveals your maturity level. IdentityGate designs and implements the architecture to close the gaps.

Ready To Build Your Zero Trust Architecture?

Your assessment reveals your maturity level. IdentityGate designs and implements the architecture to close the gaps.

Ready To Build Your Zero Trust Architecture?

Your assessment reveals your maturity level. IdentityGate designs and implements the architecture to close the gaps.