CISA Zero Trust Maturity Model for the identity pillar

A unified identity provider (IdP) is crucial to manage access effectively; it ensures users and entities have the right access to resources without excessive permissions. Integrating identity, credential, and access management solutions create strong authentication, tailored context-based authorization, and identity risk assessment.

The Office of Management and Budget (OMB) Memorandum-22-09, released in support of Executive Order 14028: Improving the Nation's Cybersecurity, mandates federal agencies employ centralized identity management systems for their users. These systems can integrate into applications and common platforms, ensuring a unified approach to identity management. This requirement is part of the Zero Trust strategy that enhances cybersecurity and data privacy. We recommend consolidation of IdPs, identity stores, and identity management systems by adopting Microsoft Entra ID as the IdP.

For more information, see Meet identity requirements of M-22-09 with Microsoft Entra ID.

Use the following links to go to sections of the guide.

1 Identity

This section has Microsoft guidance and recommendations for the CISA Zero Trust Maturity Model in the identity pillar. The Cybersecurity & Infrastructure Security Agency (CISA) identifies identity as an attribute, or attribute set, which uniquely describes an agency user or entity, including nonperson entities. To learn more, see Securing identity with Zero Trust.

1.1 Function: Authentication

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise authenticates identity using MFA, which may include passwords as one factor and requires validation of multiple entity attributes (e.g., locale or activity). 
Microsoft Entra ID
Establish an identity foundation by consolidating identity providers, putting Microsoft Entra ID in the path of every access request. While you identify and migrate applications to Microsoft Entra ID, implement policy that mandates new applications integrate with Microsoft Entra ID. This action ensures security policies, such as multifactor authentication (MFA) and entity attribute validation, are applied consistently for access to Enterprise resources. Throughout 2024-2025 Microsoft is rolling out MFA enforcement for admin portals. Microsoft recommends accounts use MFA.
- Migrate apps and authentication to Microsoft Entra ID
- Mandatory Microsoft Entra MFA
- Secure identity with Zero Trust

Microsoft Entra authentication methods
Enable enterprise-allowed MFA methods with policy settings in Microsoft Entra. Enable methods users select or use during sign-in.
- Manage authentication methods
- Microsoft Entra MFA overview

Microsoft Entra Conditional Access
Create Conditional Access policy to require MFA for all cloud apps. Any multifactor authentication method passes the “require MFA” grant control in Conditional Access. Include validation of multiple entity attributes, such as locale and activity. Use application targeting and network conditions.
- Enable multifactor authentication
- Cloud apps, actions, and auth in Conditional Access
- Network in Conditional Access policy

Microsoft Entra External ID
Require MFA for all users, including external guests. Configure cross-tenant access trust settings to improve the partner collaboration experience.
Cross-tenant access for B2B collaboration

Advanced Maturity Status

Enterprise begins to authenticate all identity using phishing-resistant MFA and attributes, including initial implementation of password-less MFA via FIDO2 or PIV.
Microsoft Entra ID
Migrate current applications to use Microsoft Entra ID as the identity provider (IdP). Require integration with Microsoft Entra ID for new applications. Include applications using legacy authentication protocols with Microsoft Entra application proxy. Migrate to cloud and managed authentication from federated IdPs with Staged Rollout. These actions ensure phishing-resistant MFA is applied consistently for access to enterprise resources.
- Migrate apps and auth to Microsoft Entra ID
- Microsoft Entra app gallery
- Microsoft Entra application proxy to publish on-premises apps
- Cloud authentication with Staged Rollout

Conditional Access
Configure Conditional Access authentication strengths to require phishing-resistant MFA, including passwordless MFA such as Fast IDentity Online 2 (FIDO2) passkeys, or certificate-based authentication (CBA) with personal identity verification (PIV) cards.
Microsoft Entra authentication strengths

Microsoft Entra authentication methods
Implement authentication policies with phishing-resistant methods, such as passkeys in Microsoft Authenticator, Microsoft Entra CBA, Windows Hello for Business, and passkeys. See also FIDO2 security keys. To transition users from nonphishing resistant MFA, exclude them from weaker authentication methods.
- Authentication methods
- Microsoft Entra CBA
- Passwordless security key sign-in
- Passkeys in Authenticator
- Windows Hello for Business
- M-22-09 MFA requirements

Microsoft Entra External ID
Configure cross-tenant access policies to trust MFA from partners. Enable external users to use phishing-resistant authentication methods to access resources.
Cross-tenant access for B2B
Optimal Maturity Status

Enterprise continuously validates identity with phishing-resistant MFA, not just when access is initially granted.
Conditional Access
Conditional Access policies are evaluated continuously throughout a user’s session. Configure session controls to increase the required sign-in frequency under certain conditions, like when the user or sign-in are detected as risky in Microsoft Entra ID Protection.
Session controls

Continuous Access Evaluation
Enable Continuous Access Evaluation (CAE) for critical events and near-real-time continuous access validation.
- Continuous Access Evaluation
- CAE for Microsoft 365
- CAE-enabled APIs in apps

1.2 Function: Identity stores

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise has a combination of self-managed identity stores and hosted identity store(s) (e.g., cloud or other enterprise) with minimal integration between the store(s) (e.g., single sign-on). 
Microsoft Entra ID
Enterprises might have apps integrated with multiple identity stores and/or identity providers (IdPs). Consolidate and adopt Microsoft Entra ID as the enterprise IdP. Plan for cloud adoption and reduction of on-premises identity store dependencies.
- Move identity and access to Microsoft Entra ID
- Migrate apps and auth to Microsoft Entra ID

Inventory apps, users, groups, and devices. Have an accurate count of identity stores. Include identity stores or IdPs, like Active Directory Federation Services (AD FS) or third-party IdPs. To ensure user, group, and device attributes consistently update across platforms, synchronize identities between on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID.
- Microsoft Entra Connect Sync
- Microsoft Entra Cloud Sync
- Single sign-on (SSO)
- App migration to Microsoft Entra ID
- Microsoft Entra integrations with authentication protocols

Microsoft Intune
Microsoft Entra hybrid-join current AD DS domain joined devices. To modernize device management, avoid domain-joining new workstations. Manage devices with Microsoft Intune.
- Cloud-first approach
- Hybrid-joined devices
- SSO to on-premises resources with joined devices
- Microsoft Intune

Advanced Maturity Status

Enterprise begins to securely consolidate and integrate some self-managed and hosted identity stores. 
Microsoft Entra ID
The enterprise adopted Microsoft Entra ID as the identity store and IdP. New apps integrate with Microsoft Entra ID. For migration, inventory current apps not integrated with Microsoft Entra ID. Legacy apps that don’t support modern authentication can use Microsoft Entra ID secure hybrid access (SHA) with Microsoft Entra application proxy. To use modern authentication protocols, replace, refactor, or reconfigure apps.
- Microsoft Entra app gallery
- Migrate apps and auth to Microsoft Entra ID

Optimal Maturity Status

Enterprise securely integrates their identity stores across all partners and environments as appropriate. 
Microsoft Entra ID
App migration to Microsoft Entra ID is complete. Access to enterprise resources requires authentication with Microsoft Entra ID.

Microsoft Entra External ID
Enable secure collaboration with External ID. Configure cross-tenant synchronization to reduce IT administrative burden. Provide seamless and automated user experiences.
- External ID
- Cross-tenant sync in Microsoft Entra ID

Microsoft Entra application provisioning
For applications with identity stores, configure app provisioning to manage identities and roles.
- App provisioning
- On-premises app provisioning
- Configure API-driven provisioning app
- Microsoft Entra application proxy to publish on-premises apps

Microsoft Entra HR inbound provisioning
Modernize with HR-driven identity provisioning. Create digital identities based on an HR system, the authoritative source for new digital identities. Provisioning often begins at this juncture. Use Microsoft Entra with on-premises HR systems to create and update users in Active Directory, or in Microsoft Entra ID.
HR-driven provisioning

Microsoft 365 for enterprise
Use the multitenant organization feature in Microsoft Entra ID and Microsoft 365 to form a tenant group and streamline intra-organizational cross-tenant collaboration. Multitenant organizations in Microsoft Entra ID and Microsoft 365 enable unified people search experience, global address list (GAL), and improved Microsoft Teams collaboration in multiple tenants.
- Multitenant organization capabilities
- Multitenant organizations in Microsoft 365

1.3 Function: Risk assessments

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise determines identity risk using manual methods and static rules to support visibility. 
Enterprises can manually review security events and configuration baselines.

Microsoft Entra ID
Use Microsoft Entra logs to assess aspects of the Microsoft Entra tenant. Microsoft Entra ID has options to access activity log data and reports for various scenarios.
- Stream activity logs to integrate tools
- Activity logs with Microsoft Graph API
- Integrate activity logs
- Real-time activity with Sentinel
- Activity logs and reports in the Azure portal
- Export activity logs for storage and queries

Configure diagnostic settings in Microsoft Entra ID to integrate logs with Azure Monitor. Stream logs to an event hub, or archive logs in a storage account.
Diagnostic settings

Advanced Maturity Status

Enterprise determines identity risk with some automated analysis and dynamic rules to inform access decisions and response activities. 
Microsoft Entra ID Protection
Configure risk-based Microsoft Entra Conditional Access policies for user and sign-in risk. Configure Conditional Access policies with response activities, based on an assessment of user impact. For example, high user and sign-in risk: block access or configure sign-in frequency session control. Use authentication strengths that require a personal identity verification (PIV) card, or phishing-resistant authentication methods.
- Microsoft Entra ID Protection
- MFA registration policy
- Secure workload identities
- Risk-based Conditional Access

Microsoft Sentinel
Microsoft Entra ID Protection alerts automatically appear in Microsoft Defender XDR. Connect Microsoft Defender XDR to Microsoft Sentinel for increased visibility, correlation with nonXDR data, longer data retention, and more customizable response automation.
- Defender XDR
- Connect Defender XDR to Sentinel

Optimal Maturity Status

Enterprise determines identity risk in real time based on continuous analysis and dynamic rules to deliver ongoing protection. 
Conditional Access
Configure Conditional Access app control for cloud apps. Protect devices with Microsoft Defender for Endpoint and enable Microsoft Defender for Office 365 to protect against threats in email, links (URLs), file attachments, and collaboration tools.
- App access monitoring with Defender for Cloud Apps and Microsoft Entra ID
- Deploy Defender for Endpoint
- Deploy Defender for Office 365

Microsoft Purview Insider Risk Management
Configure Insider Risk Management to detect, investigate, and act on malicious or accidental activities. Use insider risk policies to define risk types to identify and detect. Act on cases or escalate them to Microsoft Purview eDiscovery (Premium), if needed.
- Microsoft Purview
- Insider risk management
- Block insider-risk access

Microsoft Defender XDR
Microsoft Defender for Endpoint, Defender for Cloud Apps, and Defender for Office detect unusual activity and contribute risk signals to user and sign-in risk levels in Microsoft Entra ID Protection.
Risk detections

1.4 Function: Access management

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise authorizes access, including for privileged access requests, which expires with automated review. 
Microsoft Entra Conditional Access
Configure Conditional Access to apply policy to app usage. Conditional Access takes signals from various sources to authorize access.
Conditional Access

Microsoft Entra entitlement management
Configure access packages in entitlement management for access requests and approval workflows into roles and groups, including privileged roles and groups. Configure access review automation; include expiration and removal from roles and groups.
- Entitlement management
- Entitlement management and access packages
- Access reviews

Advanced Maturity Status

Enterprise authorizes need based and session-based access, including for privileged access request, which is tailored to actions and resources. 
Conditional Access
Configure Conditional Access to authorize access, including session-based access. Target resources, roles, and privileged roles.
Conditional Access

Microsoft Entra Privileged Identity Manager
Configure PIM to manage, control, and monitor access to important resources, such as custom roles and groups. Tailor access to specific actions and resources.
- Privileged Identity Management
- Azure custom roles in PIM
- PIM for Groups

Microsoft Purview privileged access management
Configure privileged access management for granular access control of privileged administrator tasks in Office 365.
- Privileged access management
- Get started with PAM

Optimal Maturity Status

Enterprise uses automation to authorize just-in-time and just-enough access tailored to individual actions and individual resource needs.
Microsoft Entra ID Governance
Configure Microsoft Entra ID Governance access packages to automate authorization of just-in-time (JIT) and just-enough access (JEA) tailored to individual actions and resource needs. 
- Entitlement management
- Access packages

1.5 Function: Visibility and analytics

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise collects user and entity activity logs and performs routine manual analysis and some automated analysis, with limited correlation between log types. 
Microsoft Entra ID, Azure Monitor
Archive Microsoft Entra logs in a storage account or integrate with Azure Monitor. Facilitate routine manual analysis with Kusto Data library and built-in identity workbooks with correlation of log types.
- Microsoft Entra monitoring and health
- Archive activity logs in Azure Storage
- Integrate logs with Azure Monitor logs
- Activity logs and Log Analytics
- Microsoft Entra workbooks

Advanced Maturity Status
Enterprise performs automated analysis across some user and entity activity log types and augments collection to address gaps in visibility.
Microsoft Entra ID, Microsoft Defender XDR, Microsoft Sentinel
Ingest Microsoft Entra Identity activity logs, with other Identity log categories from diagnostic settings and Defender XDR, into a security information event management (SIEM) solution, like Sentinel.
- Microsoft Entra monitoring and health
- Sign-in logs in Microsoft Entra ID
- Microsoft Sentinel
- Connect Microsoft Entra data to Sentinel
- Defender for Identity
- Connect Defender XDR data to Sentinel
- Defender for Cloud Apps

Optimal Maturity Status
Enterprise maintains comprehensive visibility and situational awareness across enterprises by performing automated analysis over user activity log types, including behavior-based analytics.
Microsoft Entra ID Protection
Enable ID Protection to monitor user behavior patterns for risk.  Configure insider risk detection and integrate with Conditional Access.
- ID Protection
- Risk policies

Sentinel, Identity Threat Detection and Response
Sentinel analytics rules and near real-time event analysis ingests and analyzes Microsoft Entra logs. Enable proactive identification of, and response to, security events and risks with advanced analytics, incident management workflows, and threat intelligence integration. Streamline incident investigation and enhance enterprise security posture.
- Microsoft Sentinel
- Near-real-time detection analytics rules
- Data connector for threat intelligence
- User and entity behavior (UEBA)

1.6 Function: Automation and orchestration

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise manually orchestrates privileged and external identities and automates orchestration of nonprivileged users and of self-managed entities. 
Microsoft Entra Connect, Microsoft Entra Cloud Sync
With on-premises Active Directory, automate orchestration of nonprivileged users with Entra Connect and/or Entra Cloud Sync. Don't synchronize privileged users from on-premises Active Directory. On the journey toward cloud-first identity, orchestrate nonprivileged users with Microsoft Entra HR Provisioning.
- Microsoft Entra Connect v2
- Microsoft Entra Cloud Sync
- Protect Microsoft 365 from on-premises attacks
- Cloud HR app to Microsoft Entra user provisioning

Advanced Maturity Status

Enterprise manually orchestrates privileged user identities and automates orchestration of all identities with integration across all environments. 
Microsoft Entra app provisioning
With Microsoft Entra application provisioning, automate orchestration of identities across environments, such as cloud providers or software as a service (SaaS) apps).
- App provisioning in Microsoft Entra ID
- System for Cross-Domain Identity Management (SCIM) sync with Microsoft Entra ID

Microsoft Entra External ID
Configure cross-tenant synchronization to automate identity orchestration across partner environments.
- External ID
- Cross-tenant sync in Microsoft Entra ID
- Configure cross-tenant sync

Optimal Maturity Status

Enterprise automates orchestration of all identities with full integration across all environments based on behaviors, enrollments, and deployment needs. 
Microsoft Entra ID Governance
At this maturity stage identity orchestration is complete. See Advanced status. Microsoft Entra entitlement management is implemented to orchestrate managed user, application, role, and group access. Complete identity integration by configuring privileged user identities with Privileged Identity Management (PIM). Use lifecycle workflows to automate movement between joiner, mover, and leaver scenarios.
- Entitlement management
- Learn about PIM
- Lifecycle workflows

1.7 Function: Governance

CISA ZTMM Stage Description Microsoft guidance and recommendations
Initial Maturity Status

Enterprise defines and begins implementing identity policies for enterprise-wide enforcement with minimal automation and manual updates. 
Microsoft Entra ID
Use Microsoft Entra ID as the identity provider (IdP) for new app integrations. Migrate current apps to Microsoft Entra ID. Configure Microsoft Entra Conditional Access policies to enforce enterprise-wide requirements, and to be the policy enforcement point (PEP) for application and resource access. Implement authorization and role mapping for current and future apps using role-based access control (RBAC), claims mapping, and outbound provisioning.
- Microsoft Entra ID Governance
- Conditional Access

Advanced Maturity Status

Enterprise implements identity policies for enterprise-wide enforcement with automation and updates policies periodically.
Conditional Access
Use Conditional Access for identity policy enforcement across the enterprise. Review and implement recommendations for Microsoft Entra ID from the CISA Secure Cloud Business Applications (SCuBA) Project, and automate Conditional Access configuration using its APIs.
- Conditional Access deployment
- CISA SCuBA and Microsoft Entra ID
- condtionalAccessPolicy resource type

Optimal Maturity Status

Enterprise implements and fully automates enterprise-wide identity policies for all users and entities across all systems with continuous enforcement and dynamic updates. 
Microsoft Entra ID
Require app access to use Microsoft Entra ID, thus enforcing Conditional Access evaluation. Use Microsoft Entra ID continuous access evaluation (CAE) for near-real-time enforcement and identity protection. This action enables dynamic adaptation to environmental risks. To enforce continuous evaluation, integrate CAE into custom apps and APIs with code.
- Continuous access evaluation
- CAE enabled APIs in apps
- Microsoft Entra ID Protection

Global Secure Access
Configure compliant network enforcement to reduce the risk of token theft and replay attacks. Enforcement works with services that support CAE. The app rejects stolen access tokens, replayed outside the tenant compliant network, in near-real-time.
- Global Secure Access
- Microsoft Entra Internet Access
- Compliant network check with Conditional Access

Next steps

Configure Microsoft Cloud Services for the CISA Zero Trust Maturity Model.