Top Banner
Security Maturity Models OVERVIEW OF SECURITY MATURITY MODELS
16

Security Maturity Models.

Apr 15, 2017

Download

Technology

Priyanka Aash
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Maturity Models.

SecurityMaturityModelsOVERVIEWOFSECURITYMATURITYMODELS

Page 2: Security Maturity Models.

Agenda1. What’saMaturityModel?2. TypesofMaturityModels3. OverviewofSSECMM&CISOPlatformSecurityBenchmarking

Page 3: Security Maturity Models.

What’saMaturityModel?“A maturity model is a set of characteristics, attributes, indicators, or patterns that represent capability andprogression in a particular discipline. Model content typically exemplifies best practices and may incorporatestandards or other codes of practice of the discipline. A maturity model thus provides a benchmark against whichan organization can evaluate the current level of capability of its practices, processes, and methods and set goalsand priorities for improvement.” – C2M2, DOE, US Govt.

How’sitUseful?

ü HelpsDefineaFrameworkforOrganizationstoBaselineCurrentCapabilities/Architecture

ü ConductStandardized,ConsistentEvaluation(s)- IdentifyGaps,BuildRoadmaps;MeasureProgress

ü AllowsOrganizationstoBenchmarktheirCapabilitiesagainstPeers

ü EnablesDecisionMaking- HowtoImprove,PrioritizeinvestmentsinTech,People,Servicesetc.

Page 4: Security Maturity Models.

TypesofMaturityModels1. Progress-basedMaturityModels

1. MeasuresSimpleProgress/AdvanceThroughAscendingLevels(asdefinedbyOrg/Industry)2. E.g.:SimplePassword->StrongPassword->TFA3. Pros:Simple;Cons:MayNOTtranslatetoMaturity

2. CapabilityMaturityModels(CMM)1. PrimarilyMeasurestheDegreetoWhichProcessesareInstitutionalized;StrengthofOrgCulture2. E.g.:SSE-CMM3. Pros:RigorousMeasureofCapabilities;Cons:FalseSenseofAchievement– Maturitydoesnot

equalsecurity

3. Hybrid–1. CombinestheAboveTwo.2. E.g.:CybersecurityCapabilityMaturityModel(ES- C2M2)3. Pro:EasyProgressMeasurement&ApproximationofCapability;Cons:NotasRigorousasCMM

AdaptedfromContentProvidedbyCERTandSoftwareEngineeringInstitute(SSE),CMU.

Page 5: Security Maturity Models.

SomeMaturityModels1. CERTCCResilienceMaturityModel

2. COBIT

3. USDept ofEnergy(DoE)ElectricitySubsectorCybersecurityCapabilityMaturityModel(ES-C2M2)

4. InformationSecurityManagementMaturityModel(ISM3)

5. NISTCSEATITSMM

6. Gartner’sSecurityModel

7. SystemsSecurityEngineeringCapabilityMaturityModel(SSE-CMM)

8. ComputerEmergencyResponseTeam/ChiefSecurityOfficerSecurityCapabilityAssessment(CERT/CSO)

9. CommunityCyberSecurityMaturityModel(CSMM)

10. FFIEC– CybersecurityMaturity

11. OpenSAMM - AppSec

12. BSIMM– AppSec

13. andManyMore…

Page 6: Security Maturity Models.

ISO/IEC21827SystemsSecurityEngineeringCapabilityMaturityModel(SSE-CMM)

Themodelisastandardmetricforsecurityengineeringpracticescoveringthefollowing:

1. Projectlifecycles,includingdevelopment,operation,maintenance,anddecommissioningactivities

2. Entireorganizations,includingmanagement,organizational,andengineeringactivities

3. Concurrentinteractionswithotherdisciplines,suchassystemsoftwareandhardware,humanfactors,testengineering;systemmanagement,operation,andmaintenance

4. Interactionswithotherorganizations,includingacquisition,systemmanagement,certification,accreditation,andevaluation.

Source:SSE-CMM

Page 7: Security Maturity Models.

SSE-CMMDimensionsLevel1- PerformedInformally

Level2– Planned&Tracked

Level3– WellDefined

Level4– QuantitativelyControlled

Level5– ContinuouslyImproving

Source:SSECMM

Page 8: Security Maturity Models.

Sample

Source:SSECMM

Page 9: Security Maturity Models.

CISOPlatformSecurityBenchmarking

◦ Aninsightaboutcompanycurrentcybersecuritypositioningamongthepeers

◦ Aninsightaboutcompanycurrentpositioningintheoverallmarket.◦ HelpstoanalysethegapinCybersecuritystructure◦ Helpsyoutofindoutthestrategicfocusareas◦ NOTaCapabilityMaturityModel

Page 10: Security Maturity Models.

IndiavsWorld• Indiais75to80%atparwithUSAforPrevention/Detectiontechnologies.• Indiaislessthan10%atparwithUSAinResponse• Indiaislessthan10%atparwithUSAforPredictionofbreachesbeforehand.• Indiaislessthan10%atparinadoptionofemergingsecuritytechnologieslike• threatIntelligenceandBigdatasecurityanalytics,RASP,IAST,Containerization/Isolation,AttackDeceptionetc.whencomparedtoUSA.

Page 11: Security Maturity Models.

Industrywisematurity

0 10 20 30 40 50 60 70 80

MinorBFSI

Retail/Online

Manufacturing

Healthcare&Hospitality

FinancialServices

MinorIT/ITES

MajorBFSI

MajorIT/ITES

LargeScaleTelecom

44.95

51.52

52.43

53.13

56.06

59.25

70.16

74.66

76.62

SecurityMaturityIndex

Verticals

SecurityMaturityIndex%

Page 12: Security Maturity Models.

CISOPlatformSecurityBenchmarkingCommunity-basedinitiativewhichhelpsorganizationsbenchmarktheirexistingsecuritypostureagainstthatoftheirpeers/industry(e.g.:BFSI,IT/ITES)anddevelopanactionable,prioritizedroadmapforachievingthedesiredmaturitylevel.

Thetechnologiesarecategorizedinto:◦ Securitycontroltype(Prevent,Detect,response,Predict)◦ Technologyadoptiontype(Basic,Moderate,Advance)

Page 13: Security Maturity Models.

Benchmarking – capabilities inplace

*TheGraphpresentedaboveisonlyindicativeandforsamplepurposesonly

SECURITYAWARENESSANDTRAININGWIRELESSSECURITY

POLICYMANAGEMENTMOBILEDEVICEMANAGEMENT

IAM/PIMAPPLICATION/DATABASESECURITY

SIEMENDPOINTSECURITY

DIGITALRIGHTSMANAGEMENTDLP/DATASECURITY

IDS/IPSPATCHMANAGEMENT

SECUREEMAIL/WEBGATEWAY,CONTENT…STRONGAUTHENTICATION

UNIFIEDTHREATMANAGEMENTANTIMALWARE/ANTISPYWARE

BCP/DRWEBAPPLICATIONFIREWALL

VULNERABILITYMANAGEMENTTHREATINTELLIGENCE

81.82%68.18%

77.27%45.45%45.45%

59.09%59.09%

90.91%31.82%

72.73%86.36%86.36%

100.00%63.64%

59.09%95.45%

61.00%61.00%62.00%

53.00%

CapabilityinPlaceStatistics

VerticalAdoption(%)

Page 14: Security Maturity Models.

Benchmarking - Capabilities notinplace

*TheGraphpresentedaboveisonlyindicativeandforsamplepurposesonly

0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00%

VerticalAdoption(%)

CapabilityNotinPlaceStatistics

DDOS ITGRCmanagement BioMetric EncryptionforServers/Storage/Database AntiAPT

Page 15: Security Maturity Models.

SomeResourcestoGetYouStarted1. CPSB

2. VendorSpecific,someexamples–1. nCircle2. Veracode3. KPMG - CyberKARE

3. BSIMM- https://www.bsimm.com/

4. OpenSAMM- http://www.opensamm.org/

5. https://buildsecurityin.us-cert.gov

6. C2M2- http://energy.gov/oe/services/cybersecurity/cybersecurity-capability-maturity-model-c2m2-program/cybersecurity

Page 16: Security Maturity Models.

ThankYou!