Content of Figures
1 KuppingerCole Maturity Level Matrix - How to use this document
Most organizations now critically depend upon IT services to operate and are therefore their business is vulnerable to cyber security incidents. This ...Login Free 30-day Select Access Get full Access
1.1 Why Cyber Security projects need regular reviews
Business objectives, organizational best practices and technologies are constantly evolving. It is essential to continuously review your organization/em> ...Login Free 30-day Select Access Get full Access
1.2 How to use the KuppingerCole Maturity Level Matrixes
The KuppingerCole Maturity Level Matrixes are tools for analysing the current state of IT programs and projects.
They provide information about leve ...
4. Level 4 – is characterized by a higher level of automation and efficiency. In effect the processes defined for Level 3 are automated where prac ...
5. Level 5 – is the optimal level. It builds upon the processes and technologies described in Level 4.
Level 5 Business and Organizational Att ...
1.3 Key Support Attributes
In addition to the CMM model there are six additional Key Support Attributes.
These attributes are different for the organizational and the technolo ...
|Architecture||Data and Access||Application Security||Network Security||Compute and Storage Security||Physical Security|
|A security ...|
The maturity of the above six supporting attributes are visually displayed, as described in the figure above. Where the shape fill is green this indic ...Login Free 30-day Select Access Get full Access
1.4 Using the Matrix and Supporting Attributes
As an example, the CISO of an organization is conducting a review of its overall cyber security program and security posture. The purpose of this revi ...Login Free 30-day Select Access Get full Access
2 The Cyber Security Matrixes
The following sections contain two Maturity Level Matrixes for cyber security, and covers:
- Organization / Business cyber security Maturity
- Cyber ...
2.1 Organizational / Business Cyber Security Maturity
The chart below depicts typical, exemplary characteristics and attributes of an organizational / business cyber security maturity of an organization r ...Login Free 30-day Select Access Get full Access
2.2 Cyber Security Technology Maturity
The chart below depicts typical, exemplary characteristics and attributes of the cyber security technology maturity of an organization rated from Leve ...Login Free 30-day Select Access Get full Access
3 Related Research
Advisory Note: Architecture Blueprint Hybrid Cloud Security - 72552
Advisory Note: KRIs and KPI for Access Governance - 72559
Leadership Brief: Product Security as Your Biggest Challenge: Start Before It’s Too Late - 72011
Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222
Advisory Note: GRC Reference Architecture - 72582
Architecture Blueprint: Access Governance and Privilege Management - 79045
Advisory Note: Cloud Services and Security - 72561