CISA Zero Trust Maturity Model for the devices pillar

This section has Microsoft guidance and recommendations for the CISA Zero Trust Maturity Model in the devices pillar.

2 Devices

CISA identifies a device as an asset that connects to a network, including servers, desktop and laptop computers, printers, mobiles phones, internet of things (IoT) devices, networking equipment, and more. Assets include hardware software, firmware, etc. To learn more, see Securing endpoints with Zero Trust.

Use the following links to go to sections of the guide.

2.1 Function: Policy enforcement and compliance monitoring

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise receives self-reported device characteristics (e.g., keys, tokens, users, etc., on the device) but has limited enforcement mechanisms. Enterprise has a preliminary, basic process in place to approve software use and push updates and configuration changes to devices.
Microsoft Intune, Microsoft Configuration Manager
The Microsoft Intune family of products is an integrated solution to manage devices. Use Intune device inventory, device configuration change, and software update capabilities.
With Microsoft Configuration Manager, enable cloud-attach to modernize and streamline device management.
Use of third-party mobile device management (MDM) solutions can consolidate device management with Intune.
- Intune
- Configuration Manager
- Cloud attach
- Intune migration guide
- Operating systems and browsers supported by Intune

Advanced Maturity Status

Enterprise has verified insights (i.e., an administrator can inspect and verify the data on device) on initial access to device and enforces compliance for most devices and virtual assets. Enterprise uses automated methods to manage devices and virtual assets, approve software, and identify vulnerabilities and install patches.
Intune
Configure policies to evaluate devices for compliance and configuration requirements. Administrators review insights and verify data on managed devices in the Intune admin center, and with device compliance reports.
- Intune admin center
- Device profiles in Intune

Set up automatic enrollment for initial access to devices. Enforce compliance with Intune.
- Device enrollment in Intune
- Automatic enrollment

To manage approved software, configure Windows Defender Application Control policies with Intune.
- WDAC and AppLocker
- Deploy WDAC policies

To control data access and how it’s shared by apps on mobile devices, configure app protection policies.
- App protection policies
- Create and deploy app protection policy
- Mobile app management and app protection
- Windows Autopilot

Microsoft Defender for Endpoint
Integrate Defender for Endpoint with Intune to identify vulnerabilities and remediate managed Intune devices.
Configure Defender for Endpoint in Intune

Microsoft Defender for Cloud
Protect and manage Azure virtual assets with Defender for Cloud, a cloud-native application protection platform (CNAPP). Use security measures and practices to protect cloud-based applications from cyber threats and vulnerabilities.
Defender for Cloud

Defender for Cloud, Azure Arc
To manage configurations, connect non-Azure assets, including virtual, to Defender for Cloud with Azure Arc.
- Azure Arc
- Connect Azure Arc-enabled servers to Defender for Cloud

Defender for IoT
Defender for IoT is a unified security solution to identify internet of things (IoT) and operational technology (OT) devices, vulnerabilities, and threats. Use Defender for IoT to secure IoT and OT environments, also devices without security agents or full operating systems.
Defender for IoT

Optimal Maturity Model

Enterprise continuously verifies insights and enforces compliance throughout the lifetime of devices and virtual assets. Enterprise integrates device, software, configuration, and vulnerability management across all Enterprise environments, including for virtual assets.
Microsoft Entra Conditional Access
Configure Conditional Access to continuously enforce application and data access, based on device compliance status. Configurations apply throughout device lifetime. Require that only compliant devices access resources.
- Conditional Access
- Grant controls in policy and require compliant devices

Microsoft Defender Vulnerability Management
Use Defender Vulnerability Management to continuously monitor and get recommendations. Enable risk-based prioritization with Secure Score and Exposure Score. DVM has continuous inventory of installed software (apps), digital certificates, hardware, firmware, also browser extensions.
- Defender Vulnerability Management
- Monitor device risk and compliance

Microsoft Defender for Cloud, Defender for Servers
Defender for Servers in Defender for Cloud brings threat detection and advanced defenses to Windows and Linux computers that run in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises environments.
Defender for Servers

2.2 Function: Asset and supply-chain risk management

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise tracks all physical and some virtual assets and manages supply chain risks by establishing policies and control baselines according to federal recommendations using a robust framework, (e.g., NIST SCRM.)
Microsoft Intune
Use Intune to view information about managed devices: hardware specifications, installed apps, and compliance status. The centralized view helps to monitor device health, ensure compliance with corporate policies, and manage device configurations.
Intune

Defender for Endpoint
Defender for Endpoint complements Intune with inventoried devices protected by Defender for Endpoint. Integrate Intune and Defender for Endpoint to track physical and virtual assets.
Device inventory

Adopt Microsoft software and cloud services with supply chain policies to help control baselines according to federal recommendations. This action supports responsible sourcing and supply chain integrity.
Supply chain

Advanced Maturity Status

Enterprise begins to develop a comprehensive enterprise view of physical and virtual assets via automated processes that can function across multiple vendors to verify acquisitions, track development cycles, and provide third-party assessments.
Microsoft Intune
Use Intune to enroll and manage devices on operating systems like Windows, macOS, iOS, Android, etc. Enrollment creates a centralized inventory of devices, including hardware specifications, installed apps, and compliance status. To streamline device onboarding, implement automated device enrollment such as Windows Autopilot and Apple Device Enrollment Program (DEP).
- Move to Intune
- Enroll devices in Intune

Microsoft Defender for Endpoint
Deploy Defender for Endpoint for an enterprise-wide view of physical and virtual assets, including installed software, with automation. Review insights about devices generating security alerts, including domain, risk level, and operating system. Use the discovery capability to find unmanaged devices in your network. Device discovery uses onboarded network endpoints to collect, probe, or scan for unmanaged devices.
Use the weaknesses page in Microsoft Defender Vulnerability Management for known common vulnerabilities and exposures (CVE), including third-party assessments, by CVE ID.
- Defender Vulnerability Management, software inventory
- Vulnerabilities in my organization

Optimal Maturity Status

Enterprise has a comprehensive, at-, or near-real-time view of all assets across vendors and service providers, automates its supply chain risk management as applicable, builds operations that tolerate supply chain failures, and incorporates best practices.
Microsoft Entra Conditional Access
Configure Conditional Access policies to require compliant devices, managed by Intune, or by supported mobile device management (MDM) integration partners. This control ensures an at-, or near-real-time asset view.
- Grant controls in policy, require compliant devices
- Third-party device-compliance partners in Intune

Intune, Microsoft Defender for Endpoint
Enable Defender for Endpoint and Intune to establish a service-to-service connection. Onboard devices to manage with Intune to Defender for Endpoint. Onboarding enables an at-, or near-real-time asset view. Threat analytics in Defender for Endpoint deliver threat intelligence from Microsoft Security researchers. Security teams use it to support automated risk management, including supply chain risk.
- Configure Defender for Endpoint in Intune
- Address emerging threats with Defender for Endpoint

Defender for IoT
Defender for IoT identifies internet of things (IoT) and operational technology (OT) devices, vulnerabilities, and threats. Use Defender for IoT to secure IoT and OT environments, including devices with no security agents.
Defender for IoT

Microsoft Defender External Attack Surface Management
Defender EASM continuously discovers and maps digital attack surfaces with an external view of online infrastructure. Security and IT teams identify unknowns, prioritize risks, mitigate threats, also extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated with vulnerability and infrastructure data. Discover key areas of concern.
Defender EASM

2.3 Function: Resource access

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise requires some devices or virtual assets to report characteristics then use this information to approve resource access.
Microsoft Entra ID
Register end user devices with Microsoft Entra ID. Manage device identities from the Microsoft Entra admin center.
- Microsoft Entra joined devices
- Hybrid joined devices
- Registered devices

Microsoft Entra Conditional Access
Use device signals such as location in Conditional Access policies for security decisions. Use filters based on device attributes to include and exclude policies.
- Conditions
- Filter for devices

Advanced Maturity Status

Enterprise’s initial resource access considers verified device or virtual asset insights.
Microsoft Intune, Microsoft Defender for Endpoint
Manage devices with Intune, deploy Defender for Endpoint, and configure device-compliance policy.
See section 2.1 Function: Policy enforcement and compliance; Advanced Maturity Status.

Conditional Access
Create Conditional Access policies that require hybrid or compliant device. Include device or virtual asset insights in resource access decisions.
See section 2.1 Function: Policy enforcement and compliance.

Microsoft Entra applications
Integrate apps and govern user access with Microsoft Entra ID.
See section 1.1 Function: Authentication.

Microsoft Entra application proxy
Deploy application proxy, or a secure hybrid access (SHA) partner solution, to enable Conditional Access for on-premises and legacy applications through the Zero Trust Network Access (ZTNA).
SHA with Microsoft Entra

Optimal Maturity Status

Enterprise’s resource access considers real-time risk analytics within devices and virtual assets.
Microsoft Entra ID Protection
Configure Microsoft Entra ID Protection for risk detection, including device risk, to detect risky users and sign-in events. Use the sign-in and user risk conditions to align policies with risk levels. Require multifactor authentication (MFA) for risky sign-ins.
- ID Protection
- Deploy ID Protection

Microsoft Intune, Microsoft Defender for Endpoint
Enable Defender for Endpoint and Intune to establish a service-to-service connection. Onboard managed devices with Intune to Defender for Endpoint for at- or near-real-time asset views. With Defender for Endpoint, use threat risk signals to block access to devices, based on risk score. Microsoft recommends allowing access to devices with a medium risk score, or lower.
- Configure Defender for Endpoint in Intune
- Defender Vulnerability Management
- Monitor device risk and compliance

Conditional Access
Create compliant device policy in Conditional Access. Use real-time risk analytics in devices and virtual assets for resource access decisions.
See section 2.1 Function: Policy enforcement and compliance

2.4 Function: Device threat detection

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise has some automated processes for deploying and updating threat protection capabilities to devices and to virtual assets with limited policy enforcement and compliance monitoring integration.
Microsoft Defender for Endpoint
Deploy Defender for Endpoint for end user devices.
Deploy Defender for Endpoint

Defender for Cloud
To automate processes that deploy and update threat protection capabilities to Azure virtual assets, integrate Defender for Endpoint with Defender for Cloud.
Defender for Endpoint integration

Advanced Maturity Status

Enterprise begins to consolidate threat protection capabilities to centralized solutions for devices and virtual assets and integrates most of these capabilities with policy enforcement and compliance monitoring.
Microsoft Intune
Configure Intune for device compliance policies. Include Defender for Endpoint machine risk score for policy compliance.
Intune device compliance policy

Integrate Defender for Endpoint with Intune as a Mobile Threat Defense (MTD) solution. For legacy devices managed by Microsoft Configuration Manager, configure cloud attach.
- Defender for Endpoint in Intune
- Configure Defender for Endpoint in Intune
- Cloud attach

Defender XDR
Pilot, then deploy Defender XDR components and services.
Defender XDR

Configure integrations of deployed Microsoft Defender XDR components.
- Defender for Endpoint with Defender for Cloud Apps
- Defender for Identity and Defender for Cloud Apps
- Purview Information Protection and Defender for Cloud Apps

Azure Arc
Use Azure Arc-enabled servers to manage and protect Windows and Linux physical servers. Also protect virtual machines (VMs) outside Azure. Deploy Azure Arc for servers hosted outside Azure. Onboard Arc-enabled servers into a subscription protected by Defender for Server.
- Azure Arc-enabled servers
- Azure Connected Machine agent

Defender for Cloud
Enable Defender for Servers for subscriptions with VMs in Azure. Defender for Server plans include Defender for Cloud for servers.
Defender for Servers

Optimal Maturity Status
Enterprise has a centralized threat protection security solution(s) deployed with advanced capabilities for all devices and virtual assets and a unified approach for device threat protection, policy enforcement, and compliance monitoring.
Defender XDR
To enable advanced capabilities for devices and virtual assets, integrate Defender XDR into security operations strategies.
- Defender XDR and security operations
- Advanced hunting

In Defender XDR, alerts are signals from sources that result from threat detection activities. Signals indicate malicious or suspicious events in an environment. Alerts can indicate a broader, complex attack. Related alerts are aggregated and correlated to form an incident, which represents an attack.
Alerts, incidents, and correlation in Defender XDR

Microsoft Sentinel
Configure Sentinel data connectors for Defender XDR. Enable analytics rules.
- Discover and manage Sentinel
- Connect Defender XDR data to Sentinel
- Sentinel and Defender XDR for Zero Trust

Microsoft Defender Threat Intelligence
Defender TI aggregates and enriches critical data sources viewed in an easy-to-use interface. Correlate indicators of compromise (IoCs) with related articles, actor profiles, and vulnerabilities. Analysts use Defender TI to collaborate with fellow analysts.
Defender TI

2.5 Function: Visibility and analytics

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise uses digital identifiers (e.g., interface addresses, digital tags) alongside a manual inventory and endpoint monitoring of devices when available. Some Enterprise devices and virtual assets are under automated analysis (e.g., software-based scanning) for anomaly detection based on risk.
Microsoft Intune, Microsoft Defender for Endpoint
Each device has a digital identifier. An enterprise can pilot, with some devices and virtual assets, automated analysis for anomaly detection, based on risk.
See section 2.1 Function: Policy enforcement and compliance.

Advanced Maturity Status

Enterprise automates both inventory collection (including endpoint monitoring on all standard user devices, e.g., desktops and laptops, mobile phones, tablets, and their virtual assets) and anomaly detection to detect unauthorized devices.
Defender for Endpoint
To detect unauthorized devices, automate inventory collection and anomaly detection.
Device discovery

Intune
To view details about your managed devices, use the Intune device inventory.
- Device details in Intune
- Endpoint security in Intune
- See section 2.1 Function: Policy enforcement and compliance.

Optimal Maturity Status

Enterprise automates status collection of all network-connected devices and virtual assets while correlating with identities, conducting endpoint monitoring, and performing anomaly detection to inform resource access. Enterprise tracks patterns of provisioning and/or deprovisioning of virtual assets for anomalies.
Microsoft Entra Conditional Access
Configure Conditional Access policies to require compliancy for network connected devices. Intune manages devices or a supported mobile device management (MDM) integration partner manages them. This control requires devices are enrolled in Intune, which automates status collection, endpoint monitoring, and anomaly detection to inform resource access.
- Grant controls in Conditional Access, require compliant devices
- Third-party device compliance partners support in Intune

Microsoft Defender XDR
To detect anomalies from users, devices, and applications, deploy, and integrate components in Defender XDR.
- Defender XDR
- Deploy supported devices
- Zero Trust with Defender XDR

Microsoft Entra ID Protection
ID Protection anomaly detection is enhanced by integration with other Defender XDR components.
Risks in ID Protection

Conditional Access
Configure risk-based Conditional Access policies, informed by identity risk, for user and sign-in risk, including anomaly detection. Require phishing-resistant multifactor authentication (MFA) for risky sign-ins. To monitor effects, create a policy to block high-risk users in report-only mode.
Risk-based access policy

Fusion in Microsoft Sentinel
Connect required data sources to Sentinel and enable advanced, multistage-attack detection.
- Connect data sources to Sentinel
- Advanced multistage attack detection

2.6 Function: Automation and orchestration

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise begins to use tools and scripts to automate the process of provisioning, configuration, registration, and/or deprovisioning for devices and virtual assets
Microsoft Intune
Begin automation to provision, configure, and deprovision devices.
Intune

Microsoft Entra ID
Implement Microsoft Entra ID to streamline device registration.
Automate device registration

Microsoft Defender for Endpoint
Apply basic security configurations to manage device protection.
Defender for Endpoint

Microsoft Sentinel
Use Sentinel to monitor device status.
Sentinel

Advanced Maturity Status

Enterprise has implemented monitoring and enforcement mechanisms to identify and manually disconnect or isolate noncompliant (vulnerable, unverified certificate; unregistered mac address) devices and virtual assets.
Intune
Enforce compliance policies and manage device configurations.
Compliance policy in Intune

Defender for Endpoint
Detect and respond to vulnerabilities and compliance issues with advanced threat protection.
Threat detection and response in Defender for Endpoint

Sentinel
Use Sentinel for advanced data collection, analysis, and for alerting to support monitoring and enforcement.
Advanced monitoring in Sentinel

Optimal Maturity Status

Enterprise has fully automated processes for provisioning, registering, monitoring, isolating, remediating, and deprovisioning devices and virtual assets.
Intune
Automate device lifecycles: provision, register, monitor, and deprovision.
Automate device lifecycles in Intune

Microsoft Entra ID
For a unified approach, integrate device management with identity and access control.
Integrate device management with Microsoft Entra

Microsoft Defender XDR
Use Defender XDR for advanced and automated threat detection and response.
Advanced threat detection with Defender XDR

Sentinel
Employ Sentinel to automate monitoring, compliance enforcement, and incident response.
Automate with Sentinel

2.7 Function: Governance

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise sets and enforces policies for the procurement of new devices, the lifecycle of nontraditional computing devices and virtual assets, and for regularly conducting monitoring and scanning of devices.
Microsoft Intune
Create policies for new-device procurement and lifecycles. Ensure basic configuration and management.
Intune

Microsoft Defender for Endpoint
Regularly monitor and scan devices to identify vulnerabilities and compliance issues.
Defender for Endpoint

Sentinel
Implement monitoring and scanning practices to see device status and potential issues.
Sentinel

Advanced Maturity Status

Enterprise sets enterprise-wide policies for the lifecycle of devices and virtual assets, including their enumeration and accountability, with some automated enforcement mechanisms. Accountability, with some automated enforcement mechanisms.
Intune
Define and enforce comprehensive lifecycle management policies for devices and virtual assets.
Compliance policy in Intune

Defender for Endpoint
Enhance security and compliance with automated enforcement mechanisms and advanced monitoring.
Threat detection and response

Sentinel
Use Sentinel for detailed device enumeration and accountability. Integrate with automated enforcement, where possible.
Advanced monitoring

Optimal Maturity Status

Enterprise automates policies for the lifecycle of all network-connected devices and virtual assets across the enterprise.
Intune
Automate device and virtual-asset lifecycle management: procure, configure, monitor, and deprovision.
Automate device lifecycles with Intune

Microsoft Entra ID
For a seamless approach to device and asset management, integrate lifecycle policies with identity and access management.
Integrate device management

Microsoft Defender XDR
Use Defender XDR for automated and advanced threat detection, response, and enforcement across devices and assets.
Advanced threat detection

Sentinel
Sentinel automates monitoring, compliance enforcement, and enterprise-wide lifecycle management.
Automate with Sentinel

Next steps

Configure Microsoft Cloud Services for the CISA Zero Trust Maturity Model.