CMM - Cybersecurity Maturity Model Implementation Guide
CMM - Cybersecurity Maturity Model Implementation Guide
Implementation Guide
Contributing Members
Acknowledgements:
Suhas Desai (Aujas), Anand Naik (Sequretek), Anupama Narayanan (ReBIT), Vinay Jain (ReBIT), Karthik
Bappanad (ReBIT)
Table of Content
1 Introduction 4
1.1 Document Structure and Conventions 5
1.2 Terms and Definitions 6
2 International work in this area 7
2.1 FFIEC Model 7
2.2 HKMA Model 8
3 RBI’s Cyber Security Framework 8
4 CMM Development Model 9
4.1 Core Domains 11
5 Cyber Security Preparedness, Maturity Levels and Profiles 13
5.1 Inherent Risk Categories and Levels 13
5.1.1 Inherent Risk Levels 14
5.2 Maturity Assessment 14
5.2.1 Maturity Assessment Levels 15
5.3 Scoring Model 16
6 Cyber Security Domains 18
6.1 Security Management 18
6.2 Infrastructure Management 19
6.3 Cybersecurity Engineering 21
6.4 Delivery Channels 22
6.5 Situational Awareness 23
7 Measuring Operational Effectiveness 23
8 Scoring and Reporting 24
8.1 Benchmarking 25
8.2 Management Reporting 25
9 References 26
9.1 Annex 1 - Baseline Cyber Security and Resilience Requirements 28
1 Introduction
There have been several regulatory and industry initiatives to define the cybersecurity framework for banks. The
Reserve Bank of India (RBI) set up an expert committee, under Mr G Gopalakrishna, which released its
recommendatory report in January 2011 [1]. RBI further issued a circular on cyber security framework (RBI-CSF)
in June 2016 [2]. In addition, Institute for Development and Research in Banking Technology (IDRBT) has worked
through industry initiatives and has defined “Information Security Framework [3]” and “Cyber Security Checklist
[4]”. Several international initiatives are also of note in this area, such as work by National Institute of Standards
and Technology (NIST) and Federal Financial Institutions Examination Council (FFIEC) [6] in USA and Hong
Kong Monetary Authority (HKMA) Cyber Resilience Assessment Framework (C-RAF) model in Hong Kong.
While the international frameworks and guidelines provide useful descriptions of capabilities, controls, processes
and awareness, they may not be directly applicable to Indian banks, as they do not describe the approach and the
path firms need to take to evolve their maturity in these areas. Furthermore, they have been developed as self-help
tools and do not focus on benchmarking and providing a regulatory tracking of assessment. It is also observed that
there is a lack of uniformity and firms interpret the cybersecurity frameworks differently.
Also, auditors struggle to justify the scope of audit and often there are efforts to comply but not in spirit.
Furthermore, the firms do not know if their security-related investments are adequate or if they do not suffice. To
address these and promote uniformity in standards adoption, this Cyber Security Maturity Model (CMM) has been
developed, as an industry initiative and coordinated by ReBIT. The CMM will provide guidance through:
Thus, the purpose of the cybersecurity maturity model is to further the implementation and adoption of the
mandated cybersecurity framework uniformly in the financial firms and understanding of the firm’s cybersecurity
maturity in terms of the adoption of the regulatory cybersecurity framework.
In addition, the Cyber Security Maturity Model will help the financial firms address their security gaps, plan a
security roadmap through clear guidance, assessment and best practices, enable benchmarking and help firms make
strategic investment decisions in cyber security core domains in conformity to their business needs and risk
appetite. The model will also help develop additional specifications, best practices and tools in a structured manner.
While this document assumes the scope based on the RBI-CSF, it is acknowledged that the cyber resiliency
requirements may change with time [2]. In this context the model aspires to
withstand the test of time and adapt to any new changes. The working group also acknowledges that the framework
has to be harmonious with international standards, such as NIST CSF, COBIT 5.0 [8], ISO 27000 [9] and other
standards.
This document is the implementation guide for the Cyber Security Maturity Model. It will help firms understand the
CMM spreadsheet tool and complete the self-assessment process. The CMM spreadsheet tool will be built into an
online tool eventually after feedback and initial industry adoption. As such the process will evolve. The most up to
date information will always be made available on ReBIT’s website at https://rebit.org.in. Any comments/concerns
may be submitted to [email protected].
These are cells that are not editable and may report the values or provide descriptions
These cells are internal cells used for computing the values
Wherever the CMM tables are referenced, this color coding scheme is followed.
In addition, the document also uses the NIST color coding conventions [7], as shown below:
Identify
Protect
Detect
Respond
Recover
It is recognized that several firms may operate in different regulatory regimes and consequently may need to
comply with various international security standards and framework. NIST model is adopted by many
international and domestic organizations. These
color coding will help firms align their security postures with NIST accordingly. Similarly a mapping of COBIT 5
with RBI’s Cybersecurity Framework, albeit not directly used in the model is referenced [11]. These various
mappings would assist a firm to meet varied needs of
various regulatory regimes and ease their assessment and compliance burden. That said, it needs to be emphasised
that this CMM document derives its strength from the contributions from the members operating primarily within
RBI-CSF.
The Chapter 2 describes the international work and efforts in this area. Chapter 3 discusses the RBI-CSF and
provides a high level overview which forms the underpinning of the CMM. Chapter 4 outlines the Cybersecurity
Maturity Model structure, describes risk, maturity and effectiveness assessment structure and general overview.
Chapter 5 describes the categorization of inherent risk, assessment model, maturity levels and scoring model and
thus lays the foundational structure on which the CMM is built. Chapter 6 describes the organization of the
assessment areas into logical domains. Chapter 7 outlines the mechanisms of the operational effectiveness
measurement and Chapter 8 describes the scoring and reporting mechanisms.
The key terminologies in the document uses the consolas font. Rest of the document uses Lucida Sans.
Control Principles Each of the Control Area, may have multiple mechanisms
and controls that can be assessed separately or form a logical group,
these are called “Control Principles” in the maturity model. The
Control Principles are specific controls that may be related to people,
process or technology aspect of improving maturity for the parent
Control Area.
Inherent Risk The Inherent Risk is risk arising of the area of business
operations, size and number of external touch points. It is independent
of process, controls and technology the organization may put in place.
Understanding the Inherent Risk is important for determining the
maturity levels of the target.
Maturity Assessment The Maturity Assessment is the process of identifying the level of
maturity based on the Control Principles defined. Each Control
Principle is defined with five
progressive levels of maturity.
While the Control Principles are a self-assessed
Operational mechanism to understand and plan improvements in a
Effectiveness particular Control Area, the Operational Effectiveness
measures the on-the-ground realities to assess the
adoption and execution of the Control Principles. Thus
the Maturity Assessment may be subjective to some
extent, but Operational Effectiveness is objective.
Maturity Assessment
Score A consolidated number on a scale of 0-500 will provide a final
Maturity Assessment Score after the self- assessment representing
maturity across the applicable and assessed Control Areas.
Color coding as per the NIST framework. NIST framework does not define a separate governance area. These areas
in the above diagrams are identified in white color background.
Identify
Protect
Detect
Respond
Recover
4 CMM Development Model
The Cyber Security Maturity Model encompasses four key segments. These four segments describing the scope,
risk, assessment and effectiveness comprises the overall scope of the Cyber Security Maturity Model.
The core domains areas broadly classify the The “Inherent Risk” of an organization
various control areas into logical groups. The depends upon the products and services
Model defines five Core Domain areas. Each of that it operates, the assets that are
the domain has multiple Control Areas, based on needed to provide financial services to its
thematic categorisation for assessing maturity in a customers, the delivery channels it uses,
particular area to track and assess process and and its track record on cyber incidents.
operational effectiveness. The “Control Areas” are
further sub-divided into “Control Principles” for
maturity assessments.
Thus the Cyber Security Maturity Model broadly assesses three main things across the “Core Domain” areas as
shown in the figure below.
Fig. 2.1 CMM three main assessment types
The following diagram shows relationship between various CMM segments. These relationships help
establish the mechanisms for 3 types of aforementioned assessments. While the “Inherent Risk” measures the
risk based on business operation, the “Maturity Assessment” and “Operational Effectiveness” are related to the
assessments logically grouped by “Control Areas”.
Inherent Risk
Standards
RB NIST ISO 27001
I
Gopalakrishna Cyber ISO
ISO 27001
security NIST Sub-Category 27001:2013
Committee IDRBT DSCI
Framework Control No. Domain
Since the CMM will also be used for benchmarking and comparative analysis, it is desirable to group similar
organizations together. In this context a concept of “Business Profile” is used. The model itself, as defined in the
CMM assessment spreadsheet, does not encapsulate any requirements for organization to assess their business
profile, but lists areas of business operations pertinent to the organization. Furthermore the “Business Profile” may
be used to assess the “Inherent Risk”. The concept of “Business Profile” is implicit in the model.
The following table below describes the five Core Domain areas, the respective Control Areas and their definitions.
Table 4.1
# Core Domains
1 Security Management
2 Infrastructure Management
3 Cybersecurity Engineering
4 Delivery Channels
5 Situational Awareness
The Core Domains enable a firm to logically group people, process and technology aspects of cybersecurity control
areas to appropriately assess and measure maturity score levels in these areas and thus provide guidance on those
areas and the others which need improvement.
The Core Domain areas are further divided into 25 Control Areas. The following diagram shows the split of
the domain areas.
Fig. 4.1 CMM Domains and Control Areas
The first step in the self-assessment using the CMM tool is to evaluate the Inherent Risk of
the firm. The inherent risk relates to business risk a firm is exposed to based on its size, area of operation, but
irrespective of controls, policies and its own security postures. The inherent risk assessment is important because, it
gives an indication about what level of maturity is adequate for the organization. Higher the Inherent Risk, higher
the requirement for maturity level. Organizations with similar inherent risk profiles may be grouped together to
provide a better benchmarking of the maturity levels needed in their peer group.
The inherent risk is grouped into the following four assessment categories:
Table 5.1
Inherent Risk Assessment Areas
Category-1: Technology
Category-2: Delivery Channels
Category-3: Products and technology services
Category-4: Tracked record on cyber threats
Table 5.2
Inherent Risk Levels
Low
Medium
High
Not Applicable
Table 5.3
Maturity Assessment Rating Descriptio
Missing Control Strategy 0 n
Control strategy is not defined.
INITIALIZING 1 Processes unpredictable, poorly controlled and reactive
DEVELOPING 2 Processes characterized for projects and is often reactive
OPERATING 3 Processes characterized for the organization and is proactive
MANAGING 4 Processes measured and controlled
OPTIMIZING 5 Focus and process improvement
Each of the “Control Principles” is classified into one of these aforementioned levels. The general principles used to
define the maturity levels is provided in Table 5.3. They represent incremental level of a firm’s capability in
strengthening their cybersecurity posture. For example, when a firm assesses itself at L4, the maturity defined in the
preceding levels i.e.
L1, L2 & L3 is assumed. In rare cases, it may appear that a firm’s capabilities meet the control requirements defined
at a certain maturity level, but do not completely meet control requirements defined in a preceding maturity level. In
such cases, careful review and documentation should highlight such exceptions before assessing the firm at a higher
level of maturity.
The financial firms would be able to determine maturity levels on the basis of inherent risks needed for specific
assessment area. For example, if the a firm has significant risk in a specific preparedness assessment area, but the
maturity level is found to be “Evolving”, then the firm is “under invested” and needs to invest more to strengthen
the maturity level to at least Advanced. If on the other hand, the firm’s preparedness risk is found to be “Least”, but
the firm has got “Advanced” practices and controls in place, the firm has “invested in
excess”.
The following table below shows the sample mechanisms of the assessment process. The self-assessment would
require identification by the assessor whether the control is applicable or not and selection of Maturity Assessment
as defined in section 5.2.1. A score will be computed for that given control principle based on weightage assigned
to the control principle. This computed assessment score will then be consolidated in the final Maturity Assessment
Result.
Applicable Computed
Maturity
Control Areas --> Control Principle Assessment
Assessment Score
[Y]/[N]
In certain “Control Areas” the “Operational Effectiveness” can’t be measured through any metrics. In such
scenarios, the “Operational Effectiveness” work-sheet will not have any details on the control and the CMM tool
will yield a implementation score of 100%. The
“Operational Effectiveness” will map to key risk indicators and evolve dynamically over period of time.
An example of the operational effectiveness measurement worksheet is shown below.
Individual
Effectiveness
Weighted
Parameters
# Control Description of the
s Control Effectiveness
Weightage Coverage Score
1.3.1 Training: % of employees with
People and security trainings at different levels 8 70 70
Awareness % %
The consolidated score for each of the cyber security domain is computed based on the average and a final score
is computed based on Maturity Assessment and the Operational Effectiveness Score.
8.1 Benchmarking
It would be possible to define an industry benchmarking based on statistical data once financial firms start
sharing their results.
The following spider chart shows an example of an infographic that can be produced for the firm based on the
industry benchmarking.
These three consolidated scores will be rolled up into a single maturity score in the range of [0-500].
Furthermore, the industry benchmark as described in section 8.1 will form the basis of management
reporting.
9 References
[11] COBIT 5 RBI Framework Mapping, Prasad Pandse, ISACA, Version 1.1, 16th Jan 2014,
https://www.isaca.org/Groups/Professional- English/india/GroupDocuments/COBIT%205_
%20RBI_Guidelines_Mapping_Tool_version %201.1.xls