A Guide to All 91 Target Level Zero Trust ActivitiesA Guide to All 91 Target Level Zero Trust ActivitiesA Guide to All 91 Target Level Zero Trust ActivitiesA Guide to All 91 Target Level Zero Trust Activities
  • About
    • Our Story
    • FRC Use Cases
    • Leadership
    • Events
      • Event: Rocky Mountain Cyber Symposium 2026
    • Video Series
      • FRC Introduces Zero Trust
    • Community
    • Contracts
      • SEWP
      • Elastic ESI
      • Trellix ESI
  • Zero Trust
    • Zero Trust Pillar Activities
  • Services
    • Global Services & Solutions Group
    • Customer Advocacy Program (CAP)
  • Partners
    • Solutions
      • Achieve OPORD 8600 Compliance with Federal Resources Corporation & Trellix
  • News
  • Contact
    • Contact Us
    • CAREERS
    • EMPLOYEES
✕
SIEM & XDR Blog Header
The SIEM & XDR Imperative: Powering Zero Trust with Intelligent Automation, AI/ML, and Analytics 
September 16, 2025
Shifting Security Left: Integrating Security into the SDLC with a DevSecOps Factory 
September 23, 2025
September 16, 2025

A Guide to All 91 Target Level Zero Trust Activities

For federal agencies, the mandate to implement a Zero Trust architecture is clear, but the path from strategy to execution remains a significant hurdle. While the “what” and “why” of Zero Trust may be understood, translating to a set of solutions is a complex challenge.

For over 15 years, we at Federal Resources Corporation (FRC) have been dedicated to helping the U.S. Government modernize its technology and achieve its cybersecurity goals. As a Value-Added Reseller, we hold a unique vantage point, seeing both how federal agencies approach implementation and how technology manufacturers position their products to meet these objectives

We have channeled that experience to demystify the 91 Zero Trust activities required to meet the Department of Defense (DoD) Target Level of Zero Trust. The DoD has established two distinct maturity levels for implementing its Zero Trust cybersecurity model:

  • Target Level: involves implementing 91 specific activities by fiscal year 2027
  • Advanced Level: An additional 61 activities with a target achievement by 2032

Our articles are built on extensive research of foundational zero trust documents, including the DoD Zero Trust Strategy and Roadmap and NIST Special Publications, combined with practical insights gathered from our work with agency leaders and technology partners.

DoD Zero Trust Target and Advanced Level Activities (https://dodcio.defense.gov/Portals/0/Documents/Library/DoD-ZTStrategy.pdf)

The DoD Zero Trust Architecture is organized around seven foundational pillars. The table below describes these pillars, their key activities, and their benefits. Each pillar’s title links to a page with detailed articles for every Target Level Activity within that pillar

PillarWhat It CoversKey Activities & Benefits
UserEnsuring that every identity (user or service) is verified; strong authentication, authorization, and behavior-based access policies.Reduces risk of compromised credentials; enables least privilege; supports multi-factor authentication, identity proofing, role-based access control.
DeviceValidates the health, compliance, and trustworthiness of devices accessing resources.Ensures only secure, non-compromised devices can connect; device posture checks; compliance scanning; endpoint protections.
Application & WorkloadProtecting applications and workloads, whether on-premise, cloud, or hybrid. Includes securing how software is developed, deployed, and maintained.Helps prevent vulnerabilities; applies secure development lifecycles; ensures least privilege; minimizes attack surfaces.
DataSafeguarding sensitive data throughout its lifecycle: classification, encryption, governance, access controls.Protects confidentiality and integrity; enables controlled sharing; ensures compliance with data protection regulations (e.g. for mission-critical, sensitive, or regulated data).
Network & EnvironmentSegmentation, context-aware traffic controls, limiting lateral movement. Network architecture that supports Zero Trust principles.Makes it harder for attackers to move laterally, contains breaches, uses micro-segmentation, perimeter reductions, and employs least-privilege networking.
Automation & OrchestrationUsing automated tools, workflows, and policy enforcement mechanisms to scale and sustain Zero Trust.Consistency, repeatability, faster reaction to threats, policy drift reduction, more efficient operations.
Visibility & AnalyticsMonitoring behavior across users, devices, network; detecting anomalies; feeding metrics and telemetry into decisions.Enables detection of threats; supports risk assessment; continuous improvement and dynamic policy adaptation.

How FRC’s Articles on Zero Trust Activities Help Public Sector Agencies

For public sector organizations (federal, state, local, or other agencies) seeking to mature in their Zero Trust Architecture, FRC’s Activities articles are a useful resource in several ways:

  1. Structured Guidance Aligned With Federal Requirements
    The articles don’t just present high-level theory; they map activities explicitly to DoD and broader federal guidance. That means agencies can see how what FRC proposes helps satisfy mandates and compliance frameworks. This helps in planning, audits, budget justification, and aligning with executive orders on cybersecurity.
  2. Plain Language Explanation
    Each article provides a clear description of each activity’s purpose, goals, and desired outcomes. This helps ensure that all stakeholders have a consistent, common understanding of each activity.
  3. Actionable Implementation Guidance
    The articles provide solutions covering the necessary processes, technology categories, and relevant tools to achieve the Activity’s objective(s).
  4. Key Considerations for Technical Buyers
    We provide insights for procurement and technical teams to ensure chosen solutions support long-term compatibility and scalability.
  5. Free Consultation Offer
    For agencies unsure where they are in maturity, or which pillar to tackle first, FRC offers a free Zero Trust consultation. This lowers the barrier to entry, enabling agencies to get an expert assessment without a big upfront commitment.


FRC’s “Zero Trust Activities” offers a solid, actionable framework for public sector agencies to better understand the 91 Activities needed for the DoD Target Level of a Zero Trust Architecture. 

Learn More!

Related

Share
1

Related posts

January 14, 2026

Securing the Mission: Implementing the DoD Zero Trust Strategy with the Trellix Security Platform 


Read more
January 13, 2026

FRC Strengthens Leadership with Appointment of Technology Veteran Christopher Lynch to Board of Directors


Read more
January 6, 2026

FRC’s Primer on the “Types” of Artificial Intelligence 


Read more

PRIMARY NAICS CODES:
541519 - Other Computer-Related Services

Compliance & Certifications:
CMMI® Maturity Level 3
ISO 9001:2015

FRC SALES TEAM
814.636.8020
sales@fedresources.com

CONTRACT VEHICLES:
NASA SEWP V: #NNG15SC61B
GSA IT-70 Schedule: GS-35F-0585T

© Copyright Federal Resources Corporation | Return Policy
CONTACT