Building Cybersecurity Capability, Maturity, Resilience
Building Cybersecurity Capability, Maturity, Resilience
CAPABILITY, MATURITY,
RESILIENCE
1
CYBER SECURITY READINESS & RESILIENCE
ASSESS THE RISKS, SCALE THE CAPABILITIES, ENTERPRISE-WIDE
COMPLIANCE /
C APAB I L I T I E S C E R T I F I C AT I O N
COMPLIANCE/ RISK-BASED
C E R T I F I C AT I O N C APAB I L I T I E S
COMPLIANCE-BASED RESILIENCE-DRIVEN
RISK REDUCTION RISK REDUCTION
LAYPERSON’S
TERMS
SIMPLE GRAPHICS TO SUPPORT
BOARD COMMUNICATION
ORGANIZATION-
STANDARDIZED WIDE, ROADMAP COMPLIANCE
MATURITY RISK-BASED DEVELOPMENT VIEWS
OUR
COMPREHENSIVE
SCOPE
LEVERAGES LEADING FRAMEWORKS,
STANDARDS AND CONTROLS
Defines maturity Defines the Provides risk-based Provides views into
for people, process organization’s risk prioritization of gaps in compliance with industry-
and technology; profile and sets capabilities, maturity to standard COBIT 5,
includes hygiene; maturity targets support roadmap ISO27001, NIST CSF, CMMI
enables industry development, investment Threat Kill Chain, etc.
benchmarking options.
t
CMMI CYBER SECURITY CAPABILITY ASSESSMENT
SUPPORTS THE LEADING INDUSTRY STANDARDS
COMPREHENSIVE CYBER ASSESSMENT ARCHITECTURE
Establish Information Security Identify Supply Chain Role Evaluate Resource Establish Stakeholder Reporting Establish Risk Determine Mission Dependencies Establish Organization
Management Policy Process Management Needs Requirements Management Strategy Risk Mgmt. Process
Establish Governance System Identify Critical Infrastructure Direct Resource Direct stakeholder Establish Risk Management Determine Legal / Integrate Risk
Participation Management Needs communication Regulatory Requirements Mgmt. Program
and reporting
Define Organizational Determine Strategic Manage External Participation
Direct Governance System Identify Organizational Priorities Monitor Resource Management Monitor stakeholder Risk Tolerance Risk Objectives
Needs communication
Determine Critical Infrastructure Establish Risk Mgmt. Responsibilities
Monitor Governance System Identify Critical Dependencies
Asset Discovery & Manage Identities and General User Training Safeguard Data at Rest Secure Application Development Establish Configuration Establish Information Sharing Establish Audit Processes
Identification Credentials Baselines
Vulnerability Identification Manage Access to Systems Privileged User Training Safeguard Data in Transit Manage System Engineering Establish Change Control Develop and Maintain Response Safeguard Removable Media
Process / Recovery Plans
Supply Chain Risk Manage Access Permissions 3rd Party Training Manage Asset Lifecycle Safeguard Development Establish Backup Processes Integrate HR Security Safeguard Operational
Identification Environment Components Environment
Identification of Roles & Manage Network Integrity & Senior Leader Training Capacity Planning Manage Software Establish Maintenance Establish Vulnerability Mgmt.
Responsibilities Segregation Update/Release Processes Processes (Patch) Process
Information Classification Manage Communication Physical Security Training Integrity and Data Leak Establish Mobile Device
Considerations Protections Prevention Management
Establish Network Baselines Monitor Networks Establish Detection Roles Execute Response Plan Implement Investigation Ensure Incident Containment Execute Recovery Plan
Processes
Aggregate / Correlate Data Monitor Physical Detect Malicious Code Response Roles & Resp. Analyze Risk Events Ensure Incident Mitigation
Recovery Communications
Determine Impacts Monitor Personnel Detect Mobile Code and Browser Incident Reporting Implement Forensics Capability
Protection
Ensure Information Sharing Establish Response
Alert Thresholds Monitor 3rd Parties Implement Vulnerability Scanning Categorization
6 12/13/2017 ® 2017 ISACA. All Rights Reserved.
Est. Security Review Processes Test Detection processes
Define the scope of the assessment and the
organization’s risk profile; Risk-based maturity
CYBERSECURITY targets are defined
MATURITY
ASSESSMENT RISK
PROFILE
RISK-
BASED
MATURITY
TARGETS
CISO
Define organizational
priorities; Approve
WORKFLOW Select practices to
determine practice
roadmap Board PROCESS Operations area level maturity
Level
CISO
Develop risk
mitigation roadmap
MEASURED PRIORITIZE
MATURITY D
VS. ROADMAP
INDUSTRY
SELECT YOUR COMPANY’S UNIQUE RISK PROFILE
VL
VERY LOW
L
LOW
H
HIGH
VH
VERY HIGH
CAPABILITY AREA
General personnel Personnel capabilities Roles and responsibilities are Achievement and Proactive performance
PEOPLE
capabilities may be achieved consistently within identified, assigned, and performance of personnel improvement and resourcing
performed by an individual, subsets of the organization, trained across the organization practices are predicted, based on organizational
but are not well defined but inconsistent across the measured, and evaluated changes and lessons learned
entire organization (internal & external)
General process Adequate procedures Organizational policies and Policy compliance is Policies and procedures are
PROCESS
capabilities may be documented within a subset of procedures are defined and measured and enforced updated based on
performed by an individual, the organization standardized. Policies and organizational changes and
Procedures are monitored
but are not well defined procedures support the lessons learned (internal &
for effectiveness
organizational strategy external) are captured.
TECHNOLOGY
General technical Technical mechanisms are Purpose and intent is defined Effectiveness of technical Technical mechanisms are
mechanisms are in place and formally identified and defined (right technology, adequately mechanisms are predicted, proactively improved based on
may be used by an individual by a subset of the deployed); Proper technology measured, and evaluated organizational changes and lessons
organization; technical is implemented in each subset learned (internal & external)
requirements in place of the organization
CAPABILITY AREA
CAPABILITY AREA
0 1 2 3 4 5
ROADMAP DEVELOPMENT
SPECIFIC PRACTICES AND PRIORITIZED FIRST BY RISK
NIST CYBERSECURITY ALIGNMENT BY PRACTICE AREA
FILTERED RESULTS
Cybersecurity
Framework
RISK- SELECTED
BASED MATURITY
MEASURED TARGET LEVEL 4
SECOPS C APAB I L I T Y
M AT U R I T Y
ENTERPRISE
SECURITY
RISK
MGMT
WORKFORCE
READINESS