InfoGuard Cyber Security and Cyber Defence Blog

Zero Trust Maturity Model 2.0: Maturity model based on 5 strategic pillars

Written by Markus Limacher | 14 Apr 2025

 

The 5 pillars of Zero Trust: Zero Trust Maturity Model 2.0

ZTMM 2.0 is based on the five pillars of Zero Trust:

  1. Identities
  2. Devices
  3. Networks
  4. Applications and workloads
  5. Data

The aim is to provide organizations with a maturity plan that ranges from an initial state through an optimized model to an innovative approach. Specific levels are described: Traditional, Advanced and Optimal. ZTMM 2.0 integrates new aspects such as adaptive authentication and finer use cases for automation and threat intelligence.

The European Union (represented by ENISA) complements these frameworks with focus areas such as compliance standards (e.g. NIS2) and a strong focus on risk analysis for threat prevention.

The threat landscape: CISA, ENISA and MITRE TTP

Threats according to ENISA, CISA and MITRE ATT&CK TTPs (Tactics, Techniques, Procedures):

  • Ransomware attacks continue to dominate: according to ENISA, they were responsible for more than 40% of all cyber incidents in 2023/24.
  • Phishing and credential theft: 61% of data leaks are due to compromised identities
  • Insider threats and insufficiently protected APIs.
  • Initial Access (T1190): Exploitation of public-facing applications.
  • Credential Dumping (T1003): Attacks on credentials.
  • Command and Control (T1071): Use of encrypted communication channels.

ZTMM 2.0 provides companies with the tools to systematically address threats.

ZTMM 2.0 is more than just a model for determining the current situation - it is a practical tool for implementing Zero Trust under real conditions.

Concrete implementation measures for ZTMM 2.0

Identity management and access control to minimize credential theft and privilege escalation (MITRE TTPs: T1003, T1078).

Device and network segmentation to protect against lateral movement (T1071) and exploitation (T1190).

Data classification and protection

Objectives: Prevention of data exfiltration (T1002).

  • Data inventory and classification using Data Loss Prevention (DLP) tools for monitoring.
  • Encryption at all levels both at rest and in transit (T1552).
  • Protect APIs and workloads, so implement security gateways to defend against API attacks.

Automation and threat intelligence for faster detection and response (T1059).

  • SOAR/SIEM systems for threat analysis and prioritization.
  • Use Cyber Threat Intelligence (CTI) to address relevant MITRE TTPs. Example: Use of IOC (Indicators of Compromise) for automated blocking measures.
  • Zero Trust Analytics to detect anomalies in real time through machine learning.

Governance and training to reduce insider threats.

Conclusion: ZTMM2.0 combines technology and governance with foresight

Zero Trust is not just a technical paradigm, but also a strategic approach to risk mitigation. ZTMM 2.0 provides a clearly defined roadmap to guide organizations through the current threat landscape. By integrating automation, adaptive security controls and clear governance structures, organizations and government agencies can build cyber resilience for the long term.

The convergence of CISA and ENISA guidelines shows: Zero Trust is the way forward for cyber security.

Now is the right time to take the next step

ZTMM 2.0 is more than just a model for determining the current situation - it is a practical tool for implementing Zero Trust under real conditions. It helps to structure technical complexity, set priorities and make investments where they will actually have an impact. If you want to anchor Zero Trust strategically and realistically, you will find the right compass in ZTMM 2.0.

Start now with a Zero Trust Readiness Assessment- the decisive first step towards an effective Zero Trust strategy. This will give you clarity about the level of maturity, identify the necessary measures and accelerate implementation in the long term.

With our team of over 350 experienced security experts, state-of-the-art technology and two 24/7 SOCs in Switzerland and Germany, we ensure that your company is optimally protected at all times. Put your trust in our expertise. Together, we will optimize your cyber security strategy and take you to the next level.

 

 

Image caption: Image generated with AI