SlideShare a Scribd company logo
First Improvised Security Testing Conference
Madrid 18/7/2003




          Security Maturity Model


          © Vicente Aceituno
“You are only as strong
                                    as your weakest link”




                                                             2
© Vicente Aceituno, smmodel@yahoogroups.com
In 1995, Nick Leeson traded derivatives
                 bringing Barings Bank bankrupt.




                  Information systems were not at fault.

                                                           3
© Vicente Aceituno, smmodel@yahoogroups.com
…an Organization is much more
                 than information systems…



                                              Information
                 Infrastructure               Systems            People



                   Trademark &                                    Know-How
                   Prestige                   Financial Assets




                                                                             4
© Vicente Aceituno, smmodel@yahoogroups.com
Are we sure auditing an
                 information system will make an
                 Organization safer in the long run?
                           How about…
                                   Organization issues.
                                   Security Targets (Policy) issues.
                                   Security Investment Performance issues.




                                          A perfectly configured and patched
                                          system won’t stay that way for long
                                                 in an Insecure Organization!

                                                                                5
© Vicente Aceituno, smmodel@yahoogroups.com
OK. How can we know how
                    secure an Organization is and
                    how to make it safer?




                                                    6
© Vicente Aceituno, smmodel@yahoogroups.com
Introducing the Security Maturity Model

                 SMM describes the maturity of an organization
                 depending on:
                       Assignment and supervision of responsibilities.
                       Security organization.
                       Security practices.
                            Policies:
                                Expectation-driven targets.
                                Distributed Policy Enforcement Responsibility.
                            Access Control management.
                            Independent audits.
                            Quantitative data gathering.
                            Etc…
                       Security investment management.



                                                                                 7
© Vicente Aceituno, smmodel@yahoogroups.com
SMM Level 1 - Initial

                 Security is not acknowledged as a desirable property of
                 the organization. The absence of incidents is the result of
                 luck or individual efforts. The presence of incidents
                 invariably leads to the maximum impact that could be
                 expected.




                                                                               8
© Vicente Aceituno, smmodel@yahoogroups.com
SMM Level 2 - Acknowledged


                 Security is acknowledged as a desirable property of the
                 organization. The absence of incidents is the result of luck
                 or some organizational efforts. The presence of incidents
                 doesn’t always lead to the maximum impact that could be
                 expected.
                       Expectations, incidents, and assets are sometimes
                       evaluated.
                       Security measures are taken until the budget is exhausted.


                 The results of the organizational efforts fades with time.




                    From here on “Evaluation” means: Identify, Classify, Prioritize, Value
                                                                                             9
© Vicente Aceituno, smmodel@yahoogroups.com
SMM Level 3 - Defined


                 Security is acknowledged as a desirable property of the
                 organization. The absence of incidents is the result of luck
                 or continuous organizational efforts. The presence of
                 incidents normally doesn’t lead to the maximum impact
                 that could be expected.
                       Expectations, incidents and assets are sometimes evaluated.
                       Security measures are taken until the budget is exhausted.
                       Organizational security responsibilities are defined.
                       A Security Policy exists.
                       Assets are accessed using sessions.
                       Security measures are audited.


                   The results of the organizational efforts are permanent.


                                                                                    10
© Vicente Aceituno, smmodel@yahoogroups.com
SMM Level 4 - Managed
                 Security is acknowledged as a desirable property of the
                 organization. The absence of incidents is the result of
                 continuous organizational efforts. The presence of incidents
                 virtually never leads to the maximum impact that could be
                 expected.
                       Expectations, incidents and assets are evaluated.
                       The best security measures are taken considering the
                       budget.
                       Organizational security responsibilities are defined.
                       A Security Norms Framework exist and is applied.
                       Assets are accessed using sessions only.
                       Security measures are audited.
                       Responsibilities are partitioned and supervised.
                       A “Continuity of Operations Plan” exists. This plan considers
                       the organization’s current status, and is properly
                       implemented.
                 The results of the organizational efforts are permanent.

                                                                                   11
© Vicente Aceituno, smmodel@yahoogroups.com
SMM Level 5 - Optimum
                 Security is acknowledged as a desirable property of the
                 organization. The absence of incidents is the result of
                 continuous organizational efforts. The presence of incidents
                 doesn’t lead to the maximum impact that could be expected.
                       Expectations, incidents and assets are evaluated quantitatively.
                       The best security measures are taken considering the budget. It can
                       be determined if the budget is consistent with the targets defined by
                       the Security Norms Framework.
                       Organizational security responsibilities are defined.
                       A Security Norms Framework exist and is applied.
                       Assets are accessed using sessions only.
                       Security measures are audited.
                       Responsibilities are partitioned and supervised.
                       A “Continuity of Operations Plan” exists. This plan considers the
                       organization’s evolution and is properly implemented.
                       Quantitative information is collected about incidents or close calls.
                       Security measures are selected using objective criteria.
                 The results of the organizational efforts are permanent.

                                                                                               12
© Vicente Aceituno, smmodel@yahoogroups.com
SMM
                 SMM – Security Norms Framework
                 Security Policies as a single document are not flexible
                 enough in a big organization and quickly become
                 worthless.
                       An effective Security Policy describes the high-level
                       principles that describe the targets (why) and the strategies
                       (what) to reach them.
                       The Security Norms develop the strategies describing the
                       scope (where and when) of the security practices.
                       The Security Standards develop the norms with
                       specifications per domain, than can be checked.
                       Security Procedures develop standards and norms and give
                       a step-by-step description of the who and how of the
                       practice. The Operations Continuity Plan is a procedure that
                       specifies how to act when a catastrophe happens.
                       The Fair Use norm informs users about their obligations
                       when using the organization’s systems.
                       The Third Party Agreements define mutual security
                       commitments at the organization’s borders with others.

                                                                                       13
© Vicente Aceituno, smmodel@yahoogroups.com
SMM
                 SMM –Sublevels.

                 Depending on the degree of integration of the
                 existing practices, such as:
                       Theorized: The practice is identified as compulsory in the
                       Security Norms Framework, but the scope norms, standards
                       and procedures don’t exist.
                       Procedured: There are norms, standards & procedures for
                       this practice.
                       Implemented: The norms of the practice are actually used.
                       Verified: The results of the procedures used are audited
                       periodically.
                       Integrated: Circumvention of the norms of the practice is
                       insignificant.

                 …an organization may occupy any sublevel
                 within a given level.
                                                                                     14
© Vicente Aceituno, smmodel@yahoogroups.com
SMM
                 SMM – Summary.

                 Using SMM you can:
                       Determine what is your organization’s maturity.
                       Set a maturity target.
                       Plan for maturity enhancement.


                 Benefits:
                       Every partial result of achieving the higher SMM Levels won’t
                       depend any longer on external contractors. Ever.
                       Improve customer and stockholder's trust on the
                       organization.
                       Maximize turnover of Security Investment.
                       Avoid non-technical security risks, setting an environment
                       where there are no weak links.

                                                                                    15
© Vicente Aceituno, smmodel@yahoogroups.com
This presentation is just an overview. The SMM is
                                being further developed at the smmodel Group
                                smmodel@yahoogroups.com
                                groups.yahoo.com/group/smmodel




© Vicente Aceituno
18 de Julio de 2003
Open Content Licenced
www.opencontent.org/opl.shtml




                     SMM

More Related Content

PDF
Information Security Maturity Model
CSCJournals
 
PPT
Security Maturity Assessment
Claude Baudoin
 
DOC
The security risk management guide
Sergey Erohin
 
PDF
Whitepaper - Data Security while outsourcing
Raghuraman Ramamurthy
 
PDF
Agiliance Risk Vision
agiliancecommunity
 
PDF
Information Security Risks Management Maturity Model (ISRM3)
leolemes
 
PDF
SMB270: Security Essentials for ITSM
Ivanti
 
PDF
Five principles for improving your cyber security
WGroup
 
Information Security Maturity Model
CSCJournals
 
Security Maturity Assessment
Claude Baudoin
 
The security risk management guide
Sergey Erohin
 
Whitepaper - Data Security while outsourcing
Raghuraman Ramamurthy
 
Agiliance Risk Vision
agiliancecommunity
 
Information Security Risks Management Maturity Model (ISRM3)
leolemes
 
SMB270: Security Essentials for ITSM
Ivanti
 
Five principles for improving your cyber security
WGroup
 

What's hot (17)

PPTX
Emerging Need of a Chief Information Security Officer (CISO)
Maurice Dawson
 
PDF
Security Maturity Models.
Priyanka Aash
 
PDF
2006 issa journal-organizingand-managingforsuccess
asundaram1
 
PDF
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 
PDF
The safety leadership challenge building soft skills for exemplary safety p...
OHS Leaders Summit
 
PDF
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
PDF
Allgress Brochure
linkedinlion11
 
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
PDF
Techserv Brochure
guest8a430d
 
PDF
IANS-2008
Bob Radvanovsky
 
PDF
How to write an IT security policy guide - Tareq Hanaysha
Hanaysha
 
PDF
New Risk Management Paradigm for Not-For-Profits
David X Martin
 
PDF
Massbiz Consulting Crede Sed Proba
James McDonald
 
PDF
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Redspin, Inc.
 
Emerging Need of a Chief Information Security Officer (CISO)
Maurice Dawson
 
Security Maturity Models.
Priyanka Aash
 
2006 issa journal-organizingand-managingforsuccess
asundaram1
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 
The safety leadership challenge building soft skills for exemplary safety p...
OHS Leaders Summit
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
Allgress Brochure
linkedinlion11
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Techserv Brochure
guest8a430d
 
IANS-2008
Bob Radvanovsky
 
How to write an IT security policy guide - Tareq Hanaysha
Hanaysha
 
New Risk Management Paradigm for Not-For-Profits
David X Martin
 
Massbiz Consulting Crede Sed Proba
James McDonald
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Redspin, Inc.
 
Ad

Similar to Security Maturity Model (20)

PDF
2005 issa journal-risk-management
asundaram1
 
PDF
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
 
PPTX
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
Anup Narayanan
 
DOCX
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
JASS44
 
PPTX
Basic Security Concepts JMSupan 2019 Edition
JOEL JESUS SUPAN
 
DOCX
The Significance of IT Security Management & Risk Assessment
Bradley Susser
 
PDF
Is3 Capabilities Brief
mageeb
 
PPTX
Lean ISMS - An ISO27001 based System for SMBs
Thiruvadinathan A
 
PDF
Iso 27001 2005- by netpeckers consulting
Iskcon Ahmedabad
 
DOC
Lecture 1 9 sam 100-
secondclasshonors
 
PPTX
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
PDF
Security Governance - Trends and Ideas
danielblander
 
PDF
Ch09 Information Security Best Practices
phanleson
 
PDF
Vskills Certified Network Security Professional Sample Material
Vskills
 
PPTX
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
PDF
Presentation crafting your active security management strategy 3 keys and 4...
xKinAnx
 
PPT
Epic Sales Presentation
dpsmith1968
 
PPTX
Information security for business majors
Paul Melson
 
PDF
Security Feature Cover Story
Torrid Networks Private Limited
 
PPT
CCNA Security - Chapter 9
Irsandi Hasan
 
2005 issa journal-risk-management
asundaram1
 
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
 
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
Anup Narayanan
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
JASS44
 
Basic Security Concepts JMSupan 2019 Edition
JOEL JESUS SUPAN
 
The Significance of IT Security Management & Risk Assessment
Bradley Susser
 
Is3 Capabilities Brief
mageeb
 
Lean ISMS - An ISO27001 based System for SMBs
Thiruvadinathan A
 
Iso 27001 2005- by netpeckers consulting
Iskcon Ahmedabad
 
Lecture 1 9 sam 100-
secondclasshonors
 
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
Security Governance - Trends and Ideas
danielblander
 
Ch09 Information Security Best Practices
phanleson
 
Vskills Certified Network Security Professional Sample Material
Vskills
 
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Presentation crafting your active security management strategy 3 keys and 4...
xKinAnx
 
Epic Sales Presentation
dpsmith1968
 
Information security for business majors
Paul Melson
 
Security Feature Cover Story
Torrid Networks Private Limited
 
CCNA Security - Chapter 9
Irsandi Hasan
 
Ad

More from Conferencias FIST (20)

PDF
Seguridad en Open Solaris
Conferencias FIST
 
PDF
Seguridad en Entornos Web Open Source
Conferencias FIST
 
PDF
Spanish Honeynet Project
Conferencias FIST
 
PDF
Seguridad en Windows Mobile
Conferencias FIST
 
PDF
SAP Security
Conferencias FIST
 
PDF
Que es Seguridad
Conferencias FIST
 
PDF
Network Access Protection
Conferencias FIST
 
PDF
Las Evidencias Digitales en la Informática Forense
Conferencias FIST
 
PDF
Evolución y situación actual de la seguridad en redes WiFi
Conferencias FIST
 
PDF
El Information Security Forum
Conferencias FIST
 
PDF
Criptografia Cuántica
Conferencias FIST
 
PDF
Inseguridad en Redes Wireless
Conferencias FIST
 
PDF
Mas allá de la Concienciación
Conferencias FIST
 
PDF
Security Metrics
Conferencias FIST
 
PDF
PKI Interoperability
Conferencias FIST
 
PDF
Wifislax 3.1
Conferencias FIST
 
PDF
Network Forensics
Conferencias FIST
 
PDF
Riesgo y Vulnerabilidades en el Desarrollo
Conferencias FIST
 
PDF
Demostracion Hacking Honeypot y Análisis Forense
Conferencias FIST
 
PDF
Cisco Equipment Security
Conferencias FIST
 
Seguridad en Open Solaris
Conferencias FIST
 
Seguridad en Entornos Web Open Source
Conferencias FIST
 
Spanish Honeynet Project
Conferencias FIST
 
Seguridad en Windows Mobile
Conferencias FIST
 
SAP Security
Conferencias FIST
 
Que es Seguridad
Conferencias FIST
 
Network Access Protection
Conferencias FIST
 
Las Evidencias Digitales en la Informática Forense
Conferencias FIST
 
Evolución y situación actual de la seguridad en redes WiFi
Conferencias FIST
 
El Information Security Forum
Conferencias FIST
 
Criptografia Cuántica
Conferencias FIST
 
Inseguridad en Redes Wireless
Conferencias FIST
 
Mas allá de la Concienciación
Conferencias FIST
 
Security Metrics
Conferencias FIST
 
PKI Interoperability
Conferencias FIST
 
Wifislax 3.1
Conferencias FIST
 
Network Forensics
Conferencias FIST
 
Riesgo y Vulnerabilidades en el Desarrollo
Conferencias FIST
 
Demostracion Hacking Honeypot y Análisis Forense
Conferencias FIST
 
Cisco Equipment Security
Conferencias FIST
 

Recently uploaded (20)

PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Doc9.....................................
SofiaCollazos
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Software Development Methodologies in 2025
KodekX
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 

Security Maturity Model

  • 1. First Improvised Security Testing Conference Madrid 18/7/2003 Security Maturity Model © Vicente Aceituno
  • 2. “You are only as strong as your weakest link” 2 © Vicente Aceituno, [email protected]
  • 3. In 1995, Nick Leeson traded derivatives bringing Barings Bank bankrupt. Information systems were not at fault. 3 © Vicente Aceituno, [email protected]
  • 4. …an Organization is much more than information systems… Information Infrastructure Systems People Trademark & Know-How Prestige Financial Assets 4 © Vicente Aceituno, [email protected]
  • 5. Are we sure auditing an information system will make an Organization safer in the long run? How about… Organization issues. Security Targets (Policy) issues. Security Investment Performance issues. A perfectly configured and patched system won’t stay that way for long in an Insecure Organization! 5 © Vicente Aceituno, [email protected]
  • 6. OK. How can we know how secure an Organization is and how to make it safer? 6 © Vicente Aceituno, [email protected]
  • 7. Introducing the Security Maturity Model SMM describes the maturity of an organization depending on: Assignment and supervision of responsibilities. Security organization. Security practices. Policies: Expectation-driven targets. Distributed Policy Enforcement Responsibility. Access Control management. Independent audits. Quantitative data gathering. Etc… Security investment management. 7 © Vicente Aceituno, [email protected]
  • 8. SMM Level 1 - Initial Security is not acknowledged as a desirable property of the organization. The absence of incidents is the result of luck or individual efforts. The presence of incidents invariably leads to the maximum impact that could be expected. 8 © Vicente Aceituno, [email protected]
  • 9. SMM Level 2 - Acknowledged Security is acknowledged as a desirable property of the organization. The absence of incidents is the result of luck or some organizational efforts. The presence of incidents doesn’t always lead to the maximum impact that could be expected. Expectations, incidents, and assets are sometimes evaluated. Security measures are taken until the budget is exhausted. The results of the organizational efforts fades with time. From here on “Evaluation” means: Identify, Classify, Prioritize, Value 9 © Vicente Aceituno, [email protected]
  • 10. SMM Level 3 - Defined Security is acknowledged as a desirable property of the organization. The absence of incidents is the result of luck or continuous organizational efforts. The presence of incidents normally doesn’t lead to the maximum impact that could be expected. Expectations, incidents and assets are sometimes evaluated. Security measures are taken until the budget is exhausted. Organizational security responsibilities are defined. A Security Policy exists. Assets are accessed using sessions. Security measures are audited. The results of the organizational efforts are permanent. 10 © Vicente Aceituno, [email protected]
  • 11. SMM Level 4 - Managed Security is acknowledged as a desirable property of the organization. The absence of incidents is the result of continuous organizational efforts. The presence of incidents virtually never leads to the maximum impact that could be expected. Expectations, incidents and assets are evaluated. The best security measures are taken considering the budget. Organizational security responsibilities are defined. A Security Norms Framework exist and is applied. Assets are accessed using sessions only. Security measures are audited. Responsibilities are partitioned and supervised. A “Continuity of Operations Plan” exists. This plan considers the organization’s current status, and is properly implemented. The results of the organizational efforts are permanent. 11 © Vicente Aceituno, [email protected]
  • 12. SMM Level 5 - Optimum Security is acknowledged as a desirable property of the organization. The absence of incidents is the result of continuous organizational efforts. The presence of incidents doesn’t lead to the maximum impact that could be expected. Expectations, incidents and assets are evaluated quantitatively. The best security measures are taken considering the budget. It can be determined if the budget is consistent with the targets defined by the Security Norms Framework. Organizational security responsibilities are defined. A Security Norms Framework exist and is applied. Assets are accessed using sessions only. Security measures are audited. Responsibilities are partitioned and supervised. A “Continuity of Operations Plan” exists. This plan considers the organization’s evolution and is properly implemented. Quantitative information is collected about incidents or close calls. Security measures are selected using objective criteria. The results of the organizational efforts are permanent. 12 © Vicente Aceituno, [email protected]
  • 13. SMM SMM – Security Norms Framework Security Policies as a single document are not flexible enough in a big organization and quickly become worthless. An effective Security Policy describes the high-level principles that describe the targets (why) and the strategies (what) to reach them. The Security Norms develop the strategies describing the scope (where and when) of the security practices. The Security Standards develop the norms with specifications per domain, than can be checked. Security Procedures develop standards and norms and give a step-by-step description of the who and how of the practice. The Operations Continuity Plan is a procedure that specifies how to act when a catastrophe happens. The Fair Use norm informs users about their obligations when using the organization’s systems. The Third Party Agreements define mutual security commitments at the organization’s borders with others. 13 © Vicente Aceituno, [email protected]
  • 14. SMM SMM –Sublevels. Depending on the degree of integration of the existing practices, such as: Theorized: The practice is identified as compulsory in the Security Norms Framework, but the scope norms, standards and procedures don’t exist. Procedured: There are norms, standards & procedures for this practice. Implemented: The norms of the practice are actually used. Verified: The results of the procedures used are audited periodically. Integrated: Circumvention of the norms of the practice is insignificant. …an organization may occupy any sublevel within a given level. 14 © Vicente Aceituno, [email protected]
  • 15. SMM SMM – Summary. Using SMM you can: Determine what is your organization’s maturity. Set a maturity target. Plan for maturity enhancement. Benefits: Every partial result of achieving the higher SMM Levels won’t depend any longer on external contractors. Ever. Improve customer and stockholder's trust on the organization. Maximize turnover of Security Investment. Avoid non-technical security risks, setting an environment where there are no weak links. 15 © Vicente Aceituno, [email protected]
  • 16. This presentation is just an overview. The SMM is being further developed at the smmodel Group [email protected] groups.yahoo.com/group/smmodel © Vicente Aceituno 18 de Julio de 2003 Open Content Licenced www.opencontent.org/opl.shtml SMM