SlideShare a Scribd company logo
4
Most read
5
Most read
7
Most read
Security	Maturity	
Models
OVERVIEW	OF	SECURITY	MATURITY	MODELS
Agenda
1. What’s	a	Maturity	Model?
2. Types	of	Maturity	Models
3. Overview	of	SSE	CMM	&	CISO	Platform	Security	Benchmarking
What’s	a	Maturity	Model?
“A maturity model is a set of characteristics, attributes, indicators, or patterns that represent capability and
progression in a particular discipline. Model content typically exemplifies best practices and may incorporate
standards or other codes of practice of the discipline. A maturity model thus provides a benchmark against which
an organization can evaluate the current level of capability of its practices, processes, and methods and set goals
and priorities for improvement.” – C2M2, DOE, US Govt.
How’s	it	Useful?
ü Helps	Define	a	Framework	for	Organizations	to	Baseline	Current	Capabilities	/	Architecture
ü Conduct	Standardized,	Consistent	Evaluation(s)	-Identify	Gaps,	Build	Roadmaps;	Measure	Progress
ü Allows	Organizations	to	Benchmark	their	Capabilities	against	Peers
ü Enables	Decision	Making	- How	to	Improve,	Prioritize	investments	in	Tech,	People,	Services	etc.
Types	of	Maturity	Models
1. Progress-based	Maturity	Models
1. Measures	Simple	Progress	/Advance	Through	Ascending	Levels	(as	defined	by	Org/Industry)
2. E.g.:	Simple	Password	->	Strong	Password	->	TFA
3. Pros:	Simple;	Cons:	May	NOT	translate	to	Maturity
2. Capability	Maturity	Models	(CMM)
1. Primarily	Measures	the	Degree	to	Which	Processes	are	Institutionalized;	Strength	of	Org	Culture
2. E.g.:	SSE-CMM
3. Pros:	Rigorous	Measure	of	Capabilities;	Cons:	False	Sense	of	Achievement	– Maturity	does	not	
equal	security
3. Hybrid	–
1. Combines	the	Above	Two.	
2. E.g.:	Cybersecurity	Capability	Maturity	Model	(ES	- C2M2)
3. Pro:	Easy	Progress	Measurement	&	Approximation	of	Capability;	Cons:	Not	as	Rigorous	as	CMM
Adapted	from	Content	Provided	by	CERT	and	Software	Engineering	Institute	(SSE),	CMU.
Some	Maturity	Models
1. CERT	CC	Resilience	Maturity	Model
2. COBIT
3. US	Dept of	Energy	(DoE)		Electricity	Subsector	Cybersecurity	Capability	Maturity	Model	(ES-C2M2)
4. Information	Security	Management	Maturity	Model	(ISM3)	
5. NIST	CSEAT	IT	SMM
6. Gartner’s	Security	Model	
7. Systems	Security	Engineering	Capability	Maturity	Model	(SSE-CMM)	
8. Computer	Emergency	Response	Team/Chief	Security	Officer	Security	Capability	Assessment	(CERT/CSO)	
9. Community	Cyber	Security	Maturity	Model	(CSMM)	
10. FFIEC	– Cybersecurity	Maturity
11. OpenSAMM - AppSec
12. BSIMM	– AppSec
13. and	Many	More…
ISO/IEC	21827	Systems	Security	Engineering	
Capability	Maturity	Model	(SSE-CMM)	
The	model	is	a	standard	metric	for	security	engineering	practices	covering	the	following:
1. Project	lifecycles,	including	development,	operation,	maintenance,	and	decommissioning	
activities
2. Entire	organizations,	including	management,	organizational,	and	engineering	activities
3. Concurrent	interactions	with	other	disciplines,	such	as	system	software	and	hardware,	human	
factors,	test	engineering;	system	management,	operation,	and	maintenance
4. Interactions	with	other	organizations,	including	acquisition,	system	management,	certification,	
accreditation,	and	evaluation.
Source:	SSE-CMM
SSE-CMM	Dimensions
Level	1	- Performed	Informally
Level	2	– Planned	&	Tracked
Level	3	– Well	Defined
Level	4	– Quantitatively	Controlled
Level	5	– Continuously	Improving
Source:	SSE	CMM
Sample
Source:	SSE	CMM
CISO	Platform	Security	Benchmarking
◦ An	insight	about	company	current	cyber	security	positioning	among	the	
peers
◦ An	insight	about	company	current	positioning	in	the	overall	market.
◦ Helps	to	analyse	the	gap	in	Cyber	security	structure
◦ Helps	you	to	find	out	the	strategic	focus	areas
◦ NOT	a	Capability	Maturity	Model
India	vs	World
•India	is	75	to	80%	at	par	with	USA	for	Prevention	/	Detection
technologies.
•India	is	less	than	10%	at	par	with	USA	in	Response
•India	is	less	than	10%	at	par	with	USA	for	Prediction	of	breaches	
beforehand.	
•India	is	less	than	10%	at	par	in	adoption	of	emerging	security	
technologies	like	
• threat	Intelligence	and	Big	data	security	analytics,	RASP,	IAST,	Containerization/	Isolation,	
Attack	Deception	etc.	when	compared	to	USA.
Industry	wise	maturity
0 10 20 30 40 50 60 70 80
Minor	BFSI
Retail/Online
Manufacturing
Healthcare	&	Hospitality
Financial	Services
Minor	IT/ITES
Major	BFSI
Major	IT/ITES
Large	Scale	Telecom
44.95
51.52
52.43
53.13
56.06
59.25
70.16
74.66
76.62
Security	Maturity	Index
Verticals Security	Maturity	Index		%
CISO	Platform	Security	Benchmarking
Community-based	initiative	which	helps	organizations	benchmark	their	
existing	security	posture	against	that	of	their	peers	/	industry	(e.g.:	BFSI,	
IT/ITES)	and	develop	an	actionable,	prioritized	roadmap	for	achieving	the	
desired	maturity	level.
The	technologies	are	categorized	into:
◦ Security	control	type	(Prevent,	Detect,	response,	Predict)
◦ Technology	adoption	type	(Basic,	Moderate,	Advance)
Benchmarking – capabilities	in	place
*	The	Graph	presented	above	is	only	indicative	and	for	sample	purposes	only
SECURITY	AWARENESS	AND	TRAINING
WIRELESS	SECURITY
POLICY	MANAGEMENT
MOBILE	DEVICE	MANAGEMENT
IAM/PIM
APPLICATION/DATABASE	SECURITY
SIEM
END	POINT	SECURITY
DIGITAL	RIGHTS	MANAGEMENT
DLP/DATA	SECURITY
IDS/IPS
PATCH	MANAGEMENT
SECURE	EMAIL/WEB	GATEWAY,	CONTENT	…
STRONG	AUTHENTICATION
UNIFIED	THREAT	MANAGEMENT
ANTI	MALWARE/ANTISPYWARE
BCP/DR
WEB	APPLICATION	FIREWALL
VULNERABILITY	MANAGEMENT
THREAT	INTELLIGENCE
81.82%
68.18%
77.27%
45.45%
45.45%
59.09%
59.09%
90.91%
31.82%
72.73%
86.36%
86.36%
100.00%
63.64%
59.09%
95.45%
61.00%
61.00%
62.00%
53.00%
Capability	in	Place	Statistics
Vertical	Adoption(%)
Benchmarking - Capabilities	not	in	place
*	The	Graph	presented	above	is	only	indicative	and	for	sample	purposes	only
0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00%
Vertical	Adoption(%)
Capability	Not	in	Place	Statistics	
DDOS IT	GRC	management Bio	Metric Encryption	for	Servers/Storage/Database Anti	APT
Some	Resources	to	Get	You	Started
1. CPSB
2. Vendor	Specific,	some	examples	–
1. nCircle
2. Veracode
3. KPMG		- Cyber	KARE
3. BSIMM	- https://www.bsimm.com/
4. Open	SAMM	- http://www.opensamm.org/
5. https://buildsecurityin.us-cert.gov
6. C2M2	- http://energy.gov/oe/services/cybersecurity/cybersecurity-capability-maturity-model-
c2m2-program/cybersecurity
Thank	You!

More Related Content

PDF
Cyber security maturity model- IT/ITES
PPTX
SABSA Implementation(Part III)_ver1-0
PPT
Risk Assessment Process NIST 800-30
PPTX
Enterprise Security Architecture Design
PPTX
NIST Critical Security Framework (CSF)
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PPTX
Enterprise Security Architecture
PDF
Cybersecurity Roadmap Development for Executives
Cyber security maturity model- IT/ITES
SABSA Implementation(Part III)_ver1-0
Risk Assessment Process NIST 800-30
Enterprise Security Architecture Design
NIST Critical Security Framework (CSF)
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Enterprise Security Architecture
Cybersecurity Roadmap Development for Executives

What's hot (20)

PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PDF
ISO 27005:2022 Overview 221028.pdf
PDF
TOGAF 9 - Security Architecture Ver1 0
PPTX
Roadmap to security operations excellence
PDF
How To Present Cyber Security To Senior Management Complete Deck
PDF
Information security management system (isms) overview
PPTX
Soc 2 attestation or ISO 27001 certification - Which is better for organization
PPTX
Modelling Security Architecture
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
NIST SP 800 30 Flow Chart
PPT
SOC presentation- Building a Security Operations Center
PPTX
Basic introduction to iso27001
PPTX
SABSA Implementation(Part VI)_ver1-0
PPTX
Conceptual security architecture
PPTX
CISSP - Chapter 1 - Security Concepts
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
2022 Webinar - ISO 27001 Certification.pdf
PDF
Nozomi Networks Q1_2018 Company Introduction
PDF
Microsoft 365 Security and Compliance
microsoft-cybersecurity-reference-architectures (1).pptx
Cybersecurity Capability Maturity Model (C2M2)
ISO 27005:2022 Overview 221028.pdf
TOGAF 9 - Security Architecture Ver1 0
Roadmap to security operations excellence
How To Present Cyber Security To Senior Management Complete Deck
Information security management system (isms) overview
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Modelling Security Architecture
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
NIST SP 800 30 Flow Chart
SOC presentation- Building a Security Operations Center
Basic introduction to iso27001
SABSA Implementation(Part VI)_ver1-0
Conceptual security architecture
CISSP - Chapter 1 - Security Concepts
DTS Solution - Building a SOC (Security Operations Center)
2022 Webinar - ISO 27001 Certification.pdf
Nozomi Networks Q1_2018 Company Introduction
Microsoft 365 Security and Compliance
Ad

Viewers also liked (20)

PPT
Security Maturity Assessment
PDF
Information Security Benchmarking 2015
PPTX
Digital grid: Disruptive digital technologies
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PPTX
Build an Information Security Strategy
PDF
Things That Don't Matter in Your Presentation!
PDF
Accenture Mobility - Trends for the Next Decade
PPTX
Presentation Design Trends 2015
PDF
Screw You Bullet Points! [Rest in Peace]
PDF
5 tools for an awesome presentation-By Samid Razzak
PPTX
The Art of the Presentation
PPTX
Presentation Design Trends 2014
PPTX
OpenACC Month Highlights- October
PDF
Digital Trends in 2017: Making Business Impact in a Changing World
PDF
23 quick color themes for your presentation
PDF
5 Ways To Surprise Your Audience (and keep their attention)
PDF
17 Ways to Design a Presentation People Want to View
PPTX
Digital Business - Accenture
PPTX
MBA case study presentation template
PDF
5 Presentation design trends 2017
Security Maturity Assessment
Information Security Benchmarking 2015
Digital grid: Disruptive digital technologies
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Build an Information Security Strategy
Things That Don't Matter in Your Presentation!
Accenture Mobility - Trends for the Next Decade
Presentation Design Trends 2015
Screw You Bullet Points! [Rest in Peace]
5 tools for an awesome presentation-By Samid Razzak
The Art of the Presentation
Presentation Design Trends 2014
OpenACC Month Highlights- October
Digital Trends in 2017: Making Business Impact in a Changing World
23 quick color themes for your presentation
5 Ways To Surprise Your Audience (and keep their attention)
17 Ways to Design a Presentation People Want to View
Digital Business - Accenture
MBA case study presentation template
5 Presentation design trends 2017
Ad

Similar to Security Maturity Models. (20)

PPTX
Introduction to Data Management Maturity Models
PPTX
Organizational maturity model pcmm
PDF
Review of Data Management Maturity Models
PPTX
C2M2 V2.1 Overview Presentation -- July 2023.pptx
PDF
Capability Maturity Matrix PowerPoint Presentation Slides
PPT
Cmm
PDF
Product Development Capability Maturity Model PowerPoint Presentation Slides
PDF
Levelling Up - Five Real World Examples of Incremental Maturity
PDF
Ability Maturity Matrix PowerPoint Presentation Slides
PPT
Secure Software Development Models and Methods integrated with CMMI.ppt
PPTX
Maturity Models
PDF
Capability Maturity Initial Integration Management Analysis Process
PDF
Business CMM PowerPoint Presentation Slides
PDF
DevSecOpsMaturityModel.pdf
PDF
Capability Maturity Model PowerPoint Presentation Slides
PPT
Cba Ipi Cmm Intro Session 1.1
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPTX
Future Maturity (P3M3) or Five Generation Workplace - RSM UK, Andy Murray | F...
PDF
Implementing the Data Maturity Model (DMM)
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Introduction to Data Management Maturity Models
Organizational maturity model pcmm
Review of Data Management Maturity Models
C2M2 V2.1 Overview Presentation -- July 2023.pptx
Capability Maturity Matrix PowerPoint Presentation Slides
Cmm
Product Development Capability Maturity Model PowerPoint Presentation Slides
Levelling Up - Five Real World Examples of Incremental Maturity
Ability Maturity Matrix PowerPoint Presentation Slides
Secure Software Development Models and Methods integrated with CMMI.ppt
Maturity Models
Capability Maturity Initial Integration Management Analysis Process
Business CMM PowerPoint Presentation Slides
DevSecOpsMaturityModel.pdf
Capability Maturity Model PowerPoint Presentation Slides
Cba Ipi Cmm Intro Session 1.1
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Future Maturity (P3M3) or Five Generation Workplace - RSM UK, Andy Murray | F...
Implementing the Data Maturity Model (DMM)
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I

Security Maturity Models.