SlideShare a Scribd company logo
1 of 4
ACCESS CONTROLS
CAPABILITY MATURITY
MODEL (CMM)
ACCESS CONTROLS CMM (1/3)
2
Please see the following slide for the assessed current and desired future states.
Optimized
Processes and procedures are constantly improved upon through communications and a learning process. These items represent best
practices and a strategic and competitive advantage for the organization.
Managed
Processes and procedures are defined and repeatable, and individual team members have specific training and duties specialized for them.
Cross-functional training has occurred, so no single member of the team is considered irreplaceable but rather the entire team works as a
cohesive unit to complete required tasks.
Defined
Processes and procedures are codified, and this documentation is shared with the full team. Training occurs within the team and peer learning
takes place between the group. Organizational knowledge is defined and codified within the processes and procedures used by the group.
Repeatable
Processes and procedures exist but are not fully defined. Individual activities are still key to the overall success of the activities, with limited
ability to have backups of key functions. Noncomplicated tasks can be completed repeatedly with the expectation of a similar outcome.
Initial
Processes are ad hoc with limited structure and rely solely on the individual knowledge and effort of employees. Documentation or codification
of these processes is limited.
Process
Maturity
Business
Strategies and
Policies
People and
Organizational
Structure
Management
Reports
Models and
Methodologies
Systems
and Data
Business and
Risk Management
Processes
Attributes of the Capability Maturity Continuum:
Delivery Capabilities:
Strategies and policies
provide key company
stakeholders with a
common understanding
of the company’s risk
appetite, risk tolerances
and expected
standards of conduct.
Key tasks are assigned
to people with the
requisite knowledge,
skill and expertise.
Roles and
responsibilities of risk
taking versus risk
monitoring must be
defined and delineated.
For management to
make informed
decisions, reports must
be prepared with the
appropriate frequency,
be easy to use, capture
succinctly and highlight
key information for
decision-making.
Properly developed
models can help identify
and quantify risks, support
the analysis of risk/reward
trade-offs and portfolio
diversification, and
evaluate the cost-
effectiveness of risk-
mitigation alternatives and
the allocation of capital to
absorb potential losses.
Information systems
must support
methodologies and
reporting; provide
relevant, accurate and
timely information; meet
the company’s business
requirements; and be
flexible for future
enhancements.
In order to avoid or
accept risks, uniform
processes and
procedures related to
risk-taking activities
must be developed,
implemented and
monitored continuously.
ACCESS CONTROLS CMM (2/3)
3
Continuum
Business Strategies
and Policies
Business and Risk
Management
Processes
People and
Organizational
Structure
Management Reports
Models and
Methodologies
Systems and Data
Optimized
Business strategies
and policies drive value
for the organization.
Best-of-breed policies
and procedures are
reviewed from both
internal and external
sources to ensure that
a learning organization
exists.
World-class actionable
security intelligence is
utilized to drive
organizational
decisions. Continuous
benchmarking and
best-practice metrics
are employed. External
best practices are
considered.
Organizational culture
classifies security as a
strategic corporate
competency, supports
and rewards
knowledge sharing,
and provides learning
and growth
opportunities for its
people.
Dashboards are fully
developed and highly
automated. Actionable
KPIs are used as a
record information
source to drive projects
throughout the
enterprise. Information
is used by all IS
employees.
Strategic
methodologies that
emphasize continuous
improvement in
information security are
enacted with key
members of
management.
Technology processes
optimize and leverage
information through
real-time security
threats analysis.
Managed
Policies and strategies
are closely monitored
and reviewed for
accuracy. Adjustments
are made regularly to
ensure applicability.
Effectively utilizing
information security
drives formal business
and risk management
processes. Processes
are constantly updated
to ensure that they are
appropriate and up to
date.
Executive-level
sponsorship
encourages the
constant improvement
of information security
throughout the
organization. All
employees are
encouraged to manage
security functions.
Cross-departmental
reporting is in place
and utilized by the
organization to make
key decisions related to
security. Automated
security alerts are
configured across the
organization.
Input from the business
is used to constantly
refine and improve
methodologies and the
information security
model at an enterprise
level and is
communicated clearly.
Mature security
systems and processes
are utilized in order to
protect the enterprise
from threats.
Defined
Policies and strategies
are centrally housed
and maintained.
Enforcement of these
policies is centrally
mandated and
monitored. All policies
align to the overall
business strategies.
Policy enforcement
occurs regularly.
Defined and
standardized
processes are in place
for all information
security activities.
Procedures are
uniformly performed,
measured and
reviewed regularly for
required changes.
Training programs are
common. Roles,
responsibilities and
corporate culture are
adequate to support
information security.
People are aware of
information security
resources and utilize
them.
Centralized
management of key
security reporting is in
place. A standard set
of information security
reports is produced
and used to protect the
organization. Ad hoc
capabilities and
standard reporting
definitions and tools
exist.
Enhanced security
models and
methodologies are
available and utilized
for decision-making.
Formalized
methodologies are
available and shared
throughout the
organization and
security is assessed
across the
organization.
Security systems and
processes are defined,
managed and used for
reporting and threat
mitigation. Detective
and preventive controls
are automated and
pervasive among all
key systems.
ACCESS CONTROLS CMM (3/3)
4
Continuum
Business Strategies
and Policies
Business and Risk
Management
Processes
People and
Organizational
Structure
Management Reports
Models and
Methodologies
Systems and Data
Repeatable
Policies and strategies
exist in different areas
of the organization and
are followed. A uniform
understanding of
existing policies is not
held across the
organization and ad
hoc policy enforcement
occurs.
Information security
techniques are mostly
informal, and
responsibilities are only
somewhat defined.
Critical processes are
documented and
standardized.
Management has
distributed some
information security
knowledge resource
materials within the
organization. Limited
training is offered to all
employees and
responsibilities are
defined.
Key security-related
information and some
analytical reports are
available and
understood. Executive
management has
access to high-level
summary information
(e.g., board books).
Departmental
methodologies are in
place. The overall
organization
understands the need
for security and has
standard approaches
for providing the
general elements of
security.
Threat mitigation is
primarily performed by
a wide array of
disparate systems and
manual processes.
Controls are more
detective than
preventive in nature.
Initial
Policies and strategies
exist but are
maintained in different
silos throughout the
organization and may
be executed upon in
differing ways. Policy
gaps exist with
nonuniform coverage.
Processes are in place
for most tasks that
occur but are ad hoc in
nature and not clearly
documented.
Processes are not
uniform across the
organization.
Individuals within the
organization use
information security,
but uniform
understanding of the
proper business use
and definition differs.
Training exists but is
mostly ad hoc.
Developing reports that
are relevant require
significant effort and
are often on paper.
Critical intelligence
information and metrics
may not be available,
measured or managed.
Models are not used by
management to
support information
security initiatives.
Little reliance exists to
employ information
security measures.
Systems are inefficient
or nonexistent. All
threat mitigation is
performed on an ad
hoc basis. Uniform
system approaches to
information security do
not exist.

More Related Content

Similar to Access Controls Capability Maturity Model (CMM).pptx

The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Managementkmortens
 
Are you compliance ready?
Are you compliance ready?Are you compliance ready?
Are you compliance ready?Gyrus Systems
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaHanaysha
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment FrameworkJhurt7103
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principleskmortens
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance BrochureSuresh Kanniappan
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptxFaith Shimba
 
K-MEANS-MAP REDUCED ALGORITHM Guidebook_FINAL
K-MEANS-MAP REDUCED  ALGORITHM Guidebook_FINALK-MEANS-MAP REDUCED  ALGORITHM Guidebook_FINAL
K-MEANS-MAP REDUCED ALGORITHM Guidebook_FINALchristopher corlett
 
Montana-Paula-Krecicki
Montana-Paula-KrecickiMontana-Paula-Krecicki
Montana-Paula-KrecickiDaniel Paula
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS LtdJohn Tucker
 
Internal Controls Topic 2.ppt
Internal Controls Topic 2.pptInternal Controls Topic 2.ppt
Internal Controls Topic 2.pptyahyamuthamia
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurementlleuciuc1
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxcravennichole326
 
IHM CHENNAI, FORNT OFFICE 2ND YR TOPIC
IHM CHENNAI, FORNT OFFICE 2ND YR TOPICIHM CHENNAI, FORNT OFFICE 2ND YR TOPIC
IHM CHENNAI, FORNT OFFICE 2ND YR TOPICsubineratte
 
Week 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docxWeek 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docxcelenarouzie
 

Similar to Access Controls Capability Maturity Model (CMM).pptx (20)

The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Management
 
Are you compliance ready?
Are you compliance ready?Are you compliance ready?
Are you compliance ready?
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
Testing
TestingTesting
Testing
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment Framework
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principles
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
 
it grc
it grc it grc
it grc
 
K-MEANS-MAP REDUCED ALGORITHM Guidebook_FINAL
K-MEANS-MAP REDUCED  ALGORITHM Guidebook_FINALK-MEANS-MAP REDUCED  ALGORITHM Guidebook_FINAL
K-MEANS-MAP REDUCED ALGORITHM Guidebook_FINAL
 
Montana-Paula-Krecicki
Montana-Paula-KrecickiMontana-Paula-Krecicki
Montana-Paula-Krecicki
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS Ltd
 
Internal Controls Topic 2.ppt
Internal Controls Topic 2.pptInternal Controls Topic 2.ppt
Internal Controls Topic 2.ppt
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
 
Performance Measurement
Performance MeasurementPerformance Measurement
Performance Measurement
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docx
 
Unit v
Unit vUnit v
Unit v
 
IHM CHENNAI, FORNT OFFICE 2ND YR TOPIC
IHM CHENNAI, FORNT OFFICE 2ND YR TOPICIHM CHENNAI, FORNT OFFICE 2ND YR TOPIC
IHM CHENNAI, FORNT OFFICE 2ND YR TOPIC
 
Week 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docxWeek 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docx
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Access Controls Capability Maturity Model (CMM).pptx

  • 2. ACCESS CONTROLS CMM (1/3) 2 Please see the following slide for the assessed current and desired future states. Optimized Processes and procedures are constantly improved upon through communications and a learning process. These items represent best practices and a strategic and competitive advantage for the organization. Managed Processes and procedures are defined and repeatable, and individual team members have specific training and duties specialized for them. Cross-functional training has occurred, so no single member of the team is considered irreplaceable but rather the entire team works as a cohesive unit to complete required tasks. Defined Processes and procedures are codified, and this documentation is shared with the full team. Training occurs within the team and peer learning takes place between the group. Organizational knowledge is defined and codified within the processes and procedures used by the group. Repeatable Processes and procedures exist but are not fully defined. Individual activities are still key to the overall success of the activities, with limited ability to have backups of key functions. Noncomplicated tasks can be completed repeatedly with the expectation of a similar outcome. Initial Processes are ad hoc with limited structure and rely solely on the individual knowledge and effort of employees. Documentation or codification of these processes is limited. Process Maturity Business Strategies and Policies People and Organizational Structure Management Reports Models and Methodologies Systems and Data Business and Risk Management Processes Attributes of the Capability Maturity Continuum: Delivery Capabilities: Strategies and policies provide key company stakeholders with a common understanding of the company’s risk appetite, risk tolerances and expected standards of conduct. Key tasks are assigned to people with the requisite knowledge, skill and expertise. Roles and responsibilities of risk taking versus risk monitoring must be defined and delineated. For management to make informed decisions, reports must be prepared with the appropriate frequency, be easy to use, capture succinctly and highlight key information for decision-making. Properly developed models can help identify and quantify risks, support the analysis of risk/reward trade-offs and portfolio diversification, and evaluate the cost- effectiveness of risk- mitigation alternatives and the allocation of capital to absorb potential losses. Information systems must support methodologies and reporting; provide relevant, accurate and timely information; meet the company’s business requirements; and be flexible for future enhancements. In order to avoid or accept risks, uniform processes and procedures related to risk-taking activities must be developed, implemented and monitored continuously.
  • 3. ACCESS CONTROLS CMM (2/3) 3 Continuum Business Strategies and Policies Business and Risk Management Processes People and Organizational Structure Management Reports Models and Methodologies Systems and Data Optimized Business strategies and policies drive value for the organization. Best-of-breed policies and procedures are reviewed from both internal and external sources to ensure that a learning organization exists. World-class actionable security intelligence is utilized to drive organizational decisions. Continuous benchmarking and best-practice metrics are employed. External best practices are considered. Organizational culture classifies security as a strategic corporate competency, supports and rewards knowledge sharing, and provides learning and growth opportunities for its people. Dashboards are fully developed and highly automated. Actionable KPIs are used as a record information source to drive projects throughout the enterprise. Information is used by all IS employees. Strategic methodologies that emphasize continuous improvement in information security are enacted with key members of management. Technology processes optimize and leverage information through real-time security threats analysis. Managed Policies and strategies are closely monitored and reviewed for accuracy. Adjustments are made regularly to ensure applicability. Effectively utilizing information security drives formal business and risk management processes. Processes are constantly updated to ensure that they are appropriate and up to date. Executive-level sponsorship encourages the constant improvement of information security throughout the organization. All employees are encouraged to manage security functions. Cross-departmental reporting is in place and utilized by the organization to make key decisions related to security. Automated security alerts are configured across the organization. Input from the business is used to constantly refine and improve methodologies and the information security model at an enterprise level and is communicated clearly. Mature security systems and processes are utilized in order to protect the enterprise from threats. Defined Policies and strategies are centrally housed and maintained. Enforcement of these policies is centrally mandated and monitored. All policies align to the overall business strategies. Policy enforcement occurs regularly. Defined and standardized processes are in place for all information security activities. Procedures are uniformly performed, measured and reviewed regularly for required changes. Training programs are common. Roles, responsibilities and corporate culture are adequate to support information security. People are aware of information security resources and utilize them. Centralized management of key security reporting is in place. A standard set of information security reports is produced and used to protect the organization. Ad hoc capabilities and standard reporting definitions and tools exist. Enhanced security models and methodologies are available and utilized for decision-making. Formalized methodologies are available and shared throughout the organization and security is assessed across the organization. Security systems and processes are defined, managed and used for reporting and threat mitigation. Detective and preventive controls are automated and pervasive among all key systems.
  • 4. ACCESS CONTROLS CMM (3/3) 4 Continuum Business Strategies and Policies Business and Risk Management Processes People and Organizational Structure Management Reports Models and Methodologies Systems and Data Repeatable Policies and strategies exist in different areas of the organization and are followed. A uniform understanding of existing policies is not held across the organization and ad hoc policy enforcement occurs. Information security techniques are mostly informal, and responsibilities are only somewhat defined. Critical processes are documented and standardized. Management has distributed some information security knowledge resource materials within the organization. Limited training is offered to all employees and responsibilities are defined. Key security-related information and some analytical reports are available and understood. Executive management has access to high-level summary information (e.g., board books). Departmental methodologies are in place. The overall organization understands the need for security and has standard approaches for providing the general elements of security. Threat mitigation is primarily performed by a wide array of disparate systems and manual processes. Controls are more detective than preventive in nature. Initial Policies and strategies exist but are maintained in different silos throughout the organization and may be executed upon in differing ways. Policy gaps exist with nonuniform coverage. Processes are in place for most tasks that occur but are ad hoc in nature and not clearly documented. Processes are not uniform across the organization. Individuals within the organization use information security, but uniform understanding of the proper business use and definition differs. Training exists but is mostly ad hoc. Developing reports that are relevant require significant effort and are often on paper. Critical intelligence information and metrics may not be available, measured or managed. Models are not used by management to support information security initiatives. Little reliance exists to employ information security measures. Systems are inefficient or nonexistent. All threat mitigation is performed on an ad hoc basis. Uniform system approaches to information security do not exist.