Federal agencies have made substantial progress in advancing zero trust (ZT) security since Executive Order 14028, “Improving the Nation’s Cybersecurity,” was issued in 2021. The Order accelerated government-wide movement toward stronger cyber hygiene, improved software supply chain protections, and modernized security architectures. In response, agencies developed structured zero trust implementation roadmaps aligned with guidance from NIST’s SP 800-207 guidance and correctly leveraged the CISA Zero Trust Maturity Model to benchmark their progress across identity, devices, networks, applications, and data.
To support this work, agencies established essential governance structures, most notably zero trust program management offices, to coordinate enterprise-wide planning and execution. Early implementation milestones focused on tangible, high-impact security controls such as deploying phishing-resistant multi-factor authentication, maturing fine-grained access control policies, and centralizing authoritative identity attributes within enterprise identity providers.
Five years later, significant work remains across all pillars of ZTA. Although the identity pillar is where many agencies made their earliest, most visible gains, the journey doesn’t end with achieving strong identity controls. Between 2024 and 2026, Cybersecurity and Infrastructure Security Agency, Government Accountability Office, and federal surveys consistently reported that while U.S. federal agencies have made progress on Zero Trust, large portions remained in early maturity stages and had not yet achieved advanced Zero Trust capabilities.
Standardization doesn’t constrain innovation or require bureaus to relinquish oversight and control to centralized headquarters operations. It provides an interoperable foundation that allows each Component to implement solutions tailored to distinct mission requirements, risk tolerance, and operational realities.
One of the foremost challenges for large departments has been achieving departmentwide standardization in zero trust technologies. One Component may pursue a zero trust network access (ZTNA) solution while another Component within the same department with a smaller cybersecurity budget is prioritizing a centralized identity provider, or different products entirely. The result is a set of structural risks that undermine both security and efficiency through:
These risks underscore the need for product standardization to be a foundational requirement. Without a defined set of standards, zero trust can’t effectively scale or be accurately measured across a large enterprise. And maintaining it as a standalone effort risks separating it from the broader IT and security operations it’s meant to strengthen. To be sustainable, ZTA standards and functions must be embedded into the broader IT and security ecosystem.
For example, deploying cloud-based services that use APIs is important to cloud migration efforts and operations, but without monitoring tools that can discover APIs in real time as cloud traffic increases, visibility into ongoing IT transformations is reduced. While applying a single set of security controls everywhere across the enterprise isn’t practical or recommended, embedding a foundational set of zero trust reference standards into normal design and implementation allows for standardized policy enforcement.
Achieving true zero trust maturity across a large federal department requires more than isolated progress or individual Component-level advancements. It demands a unified, standards-driven approach built collaboratively across all parts of the organization. An empowered governance body is essential to drive consistency across Components. Correctly designed, it reduces friction by turning standardization into shared governance instead of top-down direction.
The work ahead involves tackling deeper challenges across segmentation, visibility, and harmonization of diverse environments. Standardizing the technology stack through a consensus-built reference architecture, consistent governance, and shared product standards remains the most effective way to reduce operational complexity, strengthen enforcement, and lower long-term costs.
1. Establish enterprise-wide standardization by:
2. Institutionalize zero trust into operations to optimize sustainability by:
3. Establish a zero trust governance board with real authority by:
With empowered governance structures, cross-Component collaboration, and a commitment to shared, flexible standards, departments can accelerate adoption, reduce fragmentation, and enable each Component to operate more efficiently. Then zero trust becomes not just a cybersecurity mandate but a scalable operational model.
Guidehouse is a global AI-led professional services firm delivering advisory, technology, and managed services to the commercial and government sectors. With an integrated business technology approach, Guidehouse drives efficiency and resilience in the healthcare, financial services, energy, infrastructure, and national security markets.