Cloud 101CircleEventsBlog

Zero Trust

Advancement Center

Leading the development of tools and resources to guide zero trust implementation.
Zero Trust Advancement Center

Zero Trust is one of the most widely talked about cybersecurity trends today. Zero Trust says no part of a computer and networking system can be implicitly trusted, including the humans operating it. Therefore, we must put measures in place to provide assurance that the systems and their components are operating appropriately, typically under a “least privilege” model and continuously verified.

Creating an industry “north star” for Zero Trust has huge implications in raising the cybersecurity baseline across the board and eliminating significant systemic risk. CSA's mission is to create research, training, professional credentialing and provide an online center for additional curated Zero Trust resources. These tools will enable enterprises to understand and implement Zero Trust principles into business planning, enterprise architectures and technology deployments. Using CSA’s agile programs for research, training and certification, as well as our global footprint of industry experts, chapters, webinars and conferences, we are uniquely positioned to build and evangelize authoritative Zero Trust best practices and tools. If you're interested in learning more, you can read the press release or contact us at [email protected].

Latest News

Zero Trust Advancement Center Overview
Zero Trust Advancement Center Overview

While the concept of Zero Trust has been well trodden by cybersecurity pundits over the years, its recent widespre...

June 7, 2023

Using Zero Trust to Mitigate Ransomware Threats
Using Zero Trust to Mitigate Ransomware Threats

Ransomware continues to have a significant impact on enterprises, and shows no signs of abating. Zero Trust securi...

January 5, 2023

Zero Trust Training Mind Map
Zero Trust Training Mind Map

The Zero Trust Training (ZTT) mind map displays the eight areas of zero trust knowledge that CSA’s ZTT will cover ...

October 10, 2022

Zero Trust Training Curriculum Overview
Zero Trust Training Curriculum Overview

Building on the foundational principle of Zero Trust that no part of a computing and networking system can be impl...

October 10, 2022

View all announcements

Get Involved

Join the Working Group

If you are looking for a way to participate as an individual you can contribute to our working group. We collaborate to develop research and guidance to help validate and protect the devices and connections on a network.

Learn more

Stay Informed

Interested in getting involved? You can sign up for our upcoming newsletter and find out more info around participating by emailing [email protected].

Program Partners

CSA has worked on this initiative with the support of highly credible industry leaders who serve as its founders and program partners. These founders are also a part of the initiative’s steering committee, providing oversight into the program development.


When the pandemic happened, you moved a billion people away from their physical networks, from their office network and you put them at random places at home from a network perspective. That broke the inertia of, "Oh, we can really ride the wave of all these rules built around the traditional network.” Legacy thinking gets thrown out the window. In a cloud sense, you need to manage the endpoints and the identity, and that's why Zero Trust is so relevant.

Todd McKinnon
CEO & Co-Founder, Okta

This network security model has to be turned on its head. The architecture needs to change. That's where the zero trust is coming in. Trust no one. Based on identity, based on device posture, based on other attributes, you connect the right user to right application. That's really what has to be done.

Jay Chaudhry
CEO, Chairman and Founder, Zscaler

In today’s mobile, work-from-anywhere world, identity has become the new security perimeter. According to the CrowdStrike 2022 Global Threat Report, nearly 80 percent of breaches leverage identity to compromise credentials and evade detection in organizations’ networks.

George Kurtz
CEO & Co-founder, CrowdStrike

Zero Trust Advancement Center Sponsors

Organizations show their commitment to building awareness and understanding of zero trust principles when they become a Zero Trust Champion for CSA's Zero Trust Advancement Center. Sponsoring ZTAC is a great opportunity to demonstrate your organization's thought leadership in providing relevant security solutions for the next generation of IT-cloud computing.

CSA Zero Trust Research

Event Recordings

Watch presentations by subject matter experts as they explain how to implement zero trust.

Watch Recording

Resources

Access the content from CSA's network of subject matter experts on zero trust. From papers to videos and more.

View Resources

Zero Trust Market Map

Created by CSA's partners at the Demo Forum, the Zero Trust Market Map displays a comprehensive mapping of security technology products related to zero trust. With the growth of cybersecurity, it is important to see where the technology is today. The market map helps provide an understanding of the current zero trust industry standing, as vetted by analyst firms.