In this section, we introduce different Zero Trust Maturity models, and explain why and how we are using one based on the US Cybersecurity and Infrastructure Security Agency (CISA) model.

Then we introduce the assessment tool through an exercise, and follow up with in-depth guidance on how to apply this assessment to your MSP.