Hi All,The NSA just released Advancing Zero Trust Maturity Throughout the User Pillar - Updated AprilThis CSI details increasingly mature capabilities in the user pillar, including recommendations and examples for achieving these maturity levels. The user (or identity) pillar highlights capabilities to establish the foundational authoritative identities of a system. Further, it describes the characteristics of authentication and authorization decisions. The user pillar maturity model builds on and matures the controls of the Federal Identity, Credential, and Access Management (FICAM) architecture. FICAM establishes five core user service practice areas: Identity Management, Credential Management, Access Management, Federation and Governance.  FICAM is the federal government's enterprise approach to design, plan, and execute common Identity, Credential, and Access Management (ICAM) processes. The FICAM framework was established in 2009 to provide a common ICAM segment architecture for federal agencies to use in ICAM program and solution roadmap planning. The FICAM capabilities, expanded and refined by ZT principles, create a solid foundation for NSS owners and operators alike. They outline ways to take concrete steps to mature ZT security practices relating to identity management, access security controls, and the U/OO/127344-23 | PP-23-0208 | APR 2023 Ver. 1.1 NSA | Advancing Zero Trust Maturity Throughout the User Pillar 3 operational practices related to establishing identities for users and strong mechanisms for authenticating and authorizing users' access to critical resources.