Zero Trust Readiness Assessment Calculator
Evaluate your organization's Zero Trust security posture across the five core pillars: Identity, Devices, Network, Applications, and Data. Each pillar is scored 1–5 and weighted to produce an overall readiness score.
Formula
Step 1 – Normalize percentage inputs to 1–5 scale:
Score = 1 + (Percentage / 100) × 4
Applies to: MFA Coverage, MDM Coverage, ZTNA Coverage, Data Classification Coverage.
Step 2 – Pillar Scores (average of sub-components):
Identity Score = (MFA_score + IAM + PAM) / 3
Device Score = (MDM_score + EDR + Compliance) / 3
Network Score = (Micro-seg + ZTNA_score + Inspection) / 3
Application Score = (AppSec + API + DevSecOps) / 3
Data Score = (Classify_score + DLP + Encryption) / 3
Visibility Score = (SIEM + UEBA) / 2
Step 3 – Weighted Overall Score (1–5 scale):
Overall = Identity×0.25 + Device×0.20 + Network×0.20 + Application×0.15 + Data×0.15 + Visibility×0.05
Step 4 – Convert to 0–100% Readiness Score:
Readiness (%) = ((Overall − 1) / 4) × 100
Maturity Levels: 0–20% = Level 1 (Traditional) | 20–40% = Level 2 (Advanced) | 40–60% = Level 3 (Optimal) | 60–80% = Level 4 (Advanced Optimal) | 80–100% = Level 5 (Optimizing)
Assumptions & References
- Pillar weights are informed by NIST SP 800-207 (Zero Trust Architecture) and the CISA Zero Trust Maturity Model v2.0 (2023), which emphasize Identity as the primary control plane (25% weight).
- Network and Device pillars share equal weight (20% each) reflecting their foundational role in ZT enforcement.
- Application and Data pillars (15% each) represent critical but often later-stage ZT implementations.
- Visibility & Analytics (5%) is a cross-cutting capability; its lower weight reflects that it amplifies other pillars rather than standing alone.
- The 1–5 maturity scale aligns with the CISA ZT Maturity Model stages: Traditional → Initial → Advanced → Optimal → Optimizing.
- Percentage-to-score normalization uses a linear mapping: 0% → 1, 100% → 5, consistent with coverage-based scoring in Forrester Zero Trust eXtended (ZTX) Framework.
- Sub-component averaging assumes equal importance within each pillar; organizations may adjust weights based on their specific threat model.
- References: NIST SP 800-207 (2020), CISA ZT Maturity Model v2.0 (2023), Forrester ZTX Framework, DoD Zero Trust Strategy (2022).