Capability Domains met by Zscaler

Zscaler Internet Access

  • Manages access by authorized users through a SaaS Service.
  • Controls what activities a user can perform on cloud apps via CASB.
  • Leverages IDP context when building access policies.
  • Encrypts all data to the Zero Trust Exchange, assuming lowest level of security.
  • Monitors and controls all connections as full proxy.
  • Routes all on prem and remote traffic.
  • Creates deny rules based on location.
  • Fully controls any outbound connections to external systems.
  • Ensures controlled information does not get accessed by unauthorized users on cloud applications.
  • Ensures controlled information is not accessed by unauthorized users on cloud applications.


  • Zscaler Private Access

  • Encrypts all data to the Zero Trust Exchange, assuming lowest level of security.
  • Monitors and controls all connections as full proxy.
  • Zero trust for all on prem and remote traffic.
  • Allows for posture checks for remote admins prior to access.
  • Limits internal user access to external systems.
  • Fully controls who can access applications that contain CUI data.
  • Shows application and server locations as they are requested by users.

  • Resources


    Leveraging Zscaler Zero Trust Platforms to Meet CMMC
    Download now>>>