Zero Trust Maturity Introduction
Introduction
The Federal Government has directed agencies to modernize their approach to cybersecurity. Executive Order 14028, “Improving the Nation’s Cybersecurity”, and OMB Memorandum M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles” direct Federal Civilian Executive Branch (FCEB) agencies to base their enterprise security architecture on Zero Trust principles. While HHS and CMS have not published new policies regarding Zero Trust, the CMS Zero Trust Workgroup is working to evolve the Zero Trust Maturity of all CMS environments through incremental change, with “Advanced” or “Optimal” maturity being the objective for systems, based on their sensitivity (the results of a recent data call for Zero Trust Maturity for AWS for CMS Cloud suggests an overall maturity level of "Advanced" for CMS Cloud).
CMS is in the midst of defining its Zero Trust strategy, policies, and approach. As such, this TRA section does not introduce any new business rules. However, to assist CMS in preparing for and aligning with Zero Trust objectives, the following topics illustrate how existing TRA business rules and recommended practices align with Zero Trust Maturity capabilities. This information can aid development teams in understanding which areas may need additional focus along the Zero Trust Journey. This is not per se a Zero Trust primer. See below for additional resources.
Overview
The Federal Zero Trust Architecture (ZTA) strategy involves migration from existing perimeter-based defenses to a “Zero Trust” approach. Zero Trust is not a single architecture, but a set of guiding principles that can improve the security posture of agency applications and environments. These seven tenets outlined in NIST SP 800-207 guide its implementation:
-
All data sources and computing services are considered resources. Including:
- Multiple classes of devices
- Small footprint devices
- Personally owned devices (BYOD)
-
All communication is secured regardless of network location.
- Both enterprise-owned network infrastructure and any other non-enterprise-owned network
- In the most secure manner available
- Access requests from inside must meet same requirements as from outside the enterprise
-
Access to individual enterprise resources is granted on a per-session basis.
- Trust in the requester is evaluated before the access is granted
- Access is granted with the least privileges needed to complete the task
- Authentication and authorization to one resource will not automatically grant access to a different resource
-
Access to resources is determined by dynamic policy, including:
- The observable state of client identity, application/service, and the requesting asset
- May include other behavioral and environmental attributes, such as security posture
- Rules and attributes are based on the needs of the business and acceptable level of risk
- Least privilege principles restrict both visibility and accessibility
-
The enterprise monitors and measures the integrity and security posture of all owned and associated assets.
- No asset is inherently trusted.
- Evaluates the security posture of the asset when evaluating a resource request.
- Continuous diagnostics and mitigation (CDM) systems monitor the state of devices and others.
-
All resource authentication and authorization are dynamic and strictly enforced before access is allowed.
-
The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture.
CMS-specific guidance for ISSOs and ADOs can be found at The 7 Tenets of Zero Trust for ISSOs and ADOs. Zero Trust Maturity is the degree to which ZTA principles have been implemented across the agency. CMS assesses this using the CISA Zero Trust Maturity Model, which is organized around a structure that is shown with five pillars:

- Identity: Federal staff, as well as partners and end users, use enterprise-managed accounts to access everything they need to do their job, protected from phishing and other attacks.
- Devices: The devices that Federal staff use are consistently tracked and monitored, with those devices’ security postures used to grant access.
- Networks: Agency systems are isolated, with encrypted network traffic flowing between and within them.
- Applications and Workloads: Enterprise applications can be made available to staff securely over the internet.
- Data: Federal security teams and data teams develop data categories and security rules to automatically detect and ultimately block unauthorized access.
Below the pillars are three steps:
- Visibility and Analytics: Collecting information about the systems to identity how things in the Pillar are working.
- Automation and Orchestration: Methods for automatically creating and maintaining the different entities and assets in a Pillar. Manual configurations can introduce errors over time, and automation helps prevent that.
- Governance: The set of policies that tell how you control and direct different assets and entities in your environment. This can include how teams create new users, decide on data classifications, and manage servers.
High-level Summary
Below are the characteristics of the maturity levels assessed for CMS environments.
Pillar | Traditional | Initial | Advanced | Optimal |
---|---|---|---|---|
Identity |
|
|
|
|
Devices |
|
|
|
|
Networks |
|
|
|
|
Applications and Workloads |
|
|
|
|
Data |
|
|
|
|
Resources and References
Find more information about Zero Trust within CMS OIT and the Federal Government at large. Some are out of the scope of the CMS migration.
Internal
- CMS Cloud Zero Trust documentation
- CyberGeek Zero Trust
External
OMB
- Executive Order 14028, “Improving the Nation’s Cybersecurity”,
- OMB Memorandum M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”
- Moving the U.S. Government Toward Zero Trust Cybersecurity Principles
NIST
- Special Publication 800-207, Zero Trust Architecture
- Special Publication 1800-35(A-E), Implementing a Zero Trust Architecture, (2nd Preliminary Draft)
CISA
Zero Trust Maturity Model Pillars
The sections that follow show ways in which the CMS TRA aligns with capabilities required for Zero Trust Maturity. The CMS objective is to implement these capabilities at the Advanced or Optimal maturity level.