Register for CSA’s SECtember conference and trainings today


Zero Trust

Advancement Center

Leading the development of tools and resources to guide zero trust implementation.
Zero Trust Advancement Center

Zero Trust is one of the most widely talked about cybersecurity trends today. Zero Trust says no part of a computer and networking system can be implicitly trusted, including the humans operating it. Therefore, we must put measures in place to provide assurance that the systems and their components are operating appropriately, typically under a “least privilege” model and continuously verified.

Creating an industry “north star” for Zero Trust has huge implications in raising the cybersecurity baseline across the board and eliminating significant systemic risk. CSA's mission is to create research, training, professional credentialing and provide an online center for additional curated Zero Trust resources. These tools will enable enterprises to understand and implement Zero Trust principles into business planning, enterprise architectures and technology deployments. Using CSA’s agile programs for research, training and certification, as well as our global footprint of industry experts, chapters, webinars and conferences, we are uniquely positioned to build and evangelize authoritative Zero Trust best practices and tools. If you're interested in learning more, you can read the press release or contact us at [email protected].

Latest News

CISO Perspectives and Progress in Deploying Zero Trust
CISO Perspectives and Progress in Deploying Zero Trust

 Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the pe...

June 6, 2022

It’s time to Zero In on Zero Trust
It’s time to Zero In on Zero Trust

Tune into these webinars to learn the ins and outs of Zero Trust from the experts.

April 7, 2022

Searching for Zero Trust
Searching for Zero Trust

Watch this presentation to learn how to embrace the Zero Trust philosophy. 

March 23, 2022

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0

SDP architecture is an effective way to implement the principles of Zero Trust. 

March 11, 2022

View all announcements

Get Involved

Join the Working Group

If you are looking for a way to participate as an individual you can contribute to our working group. We collaborate to develop research and guidance to help validate and protect the devices and connections on a network.

Learn more

Stay Informed

Interested in getting involved? You can sign up for our upcoming newsletter and find out more info around participating by emailing [email protected].

Program Partners

CSA has worked on this initiative with the support of highly credible industry leaders who serve as its founders and program partners. These founders are also a part of the initiative’s steering committee, providing oversight into the program development.

When the pandemic happened, you moved a billion people away from their physical networks, from their office network and you put them at random places at home from a network perspective. That broke the inertia of, "Oh, we can really ride the wave of all these rules built around the traditional network.” Legacy thinking gets thrown out the window. In a cloud sense, you need to manage the endpoints and the identity, and that's why Zero Trust is so relevant.

Todd McKinnon
CEO & Co-Founder, Okta

This network security model has to be turned on its head. The architecture needs to change. That's where the zero trust is coming in. Trust no one. Based on identity, based on device posture, based on other attributes, you connect the right user to right application. That's really what has to be done.

Jay Chaudhry
CEO, Chairman and Founder, Zscaler

In today’s mobile, work-from-anywhere world, identity has become the new security perimeter. According to the CrowdStrike 2022 Global Threat Report, nearly 80 percent of breaches leverage identity to compromise credentials and evade detection in organizations’ networks.

George Kurtz
CEO & Co-founder, CrowdStrike

CSA Zero Trust Research

Event Recordings

Watch presentations by subject matter experts as they explain how to implement zero trust.

Watch Recording


Access the content from CSA's network of subject matter experts on zero trust. From papers to videos and more.

View Resources