Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Understanding the Benefits of the Capability Maturity Model Integration (CMMI)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Understanding the Benefits of the Capability Maturity Model Integration (CMMI)

6 years ago Tripwire Guest Authors
Understanding the Benefits of the Capability Maturity Model Integration (CMMI)

“Cybersecurity is the leading corporate governance challenge today, yet 87% of C-suite professionals and board members lack confidence in their company’s cybersecurity capabilities. Many CISOs and CSOs focus on implementing standards and frameworks, but what good is compliance if it does not improve your overall cybersecurity resilience?” – The CMMI Institute

Many organizations have Information Security Programs (ISPs), but many executives and boards do not know how to measure progress within these programs. They are therefore hesitant to believe any investment in technology will mitigate perceived or even unknown risks. Some organizations use regulated compliance standards such as PCI DSS or AICPA attestations as measures of their ISP. However, these standards do not fully cover the enterprise risk environment because they only focus on specific areas of risk or generic tenets of security.

Due to the inability to measure cybersecurity and show reportable results, management is hesitant to fund something they cannot quantify. Therefore, information security leaders find it difficult to acquire funding to cover critical gaps in risk mitigation. Using compliance is the only available solution–however inadequate.

Introducing CMMI

Though CMMI is not an exact science, it is a way to present a quantifiable level of risk within the different elements of the ISP. CMMI can be a tool to provide the justification for necessary investment in information security.

Many organizations confuse information security with information technology. New solution requests are viewed as enhancements or wish list items. For example, requests for additional full-time employees are looked upon as operating expense costs instead of enhancing the ISP. The difference is that risk is related to those requests and ultimately are reflected in the CMMI. There is a direct correlation between people, process and technology with the CMMI.

The History of CMMI

Information Systems Audit and Control Association (ISACA) created CMMI to measure business maturity and performance in a format that could be presented to executive management. But in recent years, highly visible breaches and the impacts of those breaches motivated boards to begin understanding the maturity of the organization’s ISP.

CMMI answers this need. It is “a proven set of global best practices that drives business performance through building and benchmarking key capabilities,” per the CMMI Institute (a subsidiary of ISACA). It was originally created for the U.S. Department of Defense to assess the quality and capability of their software contractors. CMMI models can now help any industry build, improve and measure capabilities and performance.

Characteristics of the CMMI Model

There are five levels of maturity in the CMMI.

  1. Level 1 “Initial” is the organization with the least mature ISP. It is reactive, meaning it has poorly written procedures and unpredictable processes that have uncertain outcomes. Organizations at Level 1 may have limited information security expertise, with limited knowledge of strategy or tactics in dealing with threats.
  2. Level 2 “Managed” still maintains a reactive posture, but organizations at this level are more organized in information security related projects. Perhaps processes remain undocumented. The profile remains reactive.
  3. Level 3 “Defined” is a major leap from Level 2 in that the organization’s ISP becomes proactive in its approach to security incidents. Projects tailor their processes to clearly defined standards that are in line with business objectives.
  4. Level 4 “Quantitatively Managed” means that the organization has reached a level of maturity where processes, projects, and measurability are clearly defined and controlled. This environment requires an experienced information security team with strong leadership, budget, and support from executive management.
  5. Level 5 “Optimizing” is essentially building on what currently exists as a mature, quantitative, and qualitative ISP. Unfortunately, there are few organizations that can reach this level of maturity due to lack of expertise, limited talent pools, restrictive budgets, and lack of management support. All of this impedes the progress to maturity. ISPs become stagnant, technology becomes ineffective, and risk increases over time.
Characteristics of Maturity Levels

Focus Areas

Standards such as COBIT and ISO27001 have their individual CMMI models. In the past, these models did not cover all the areas needed in a CMMI model, so two elements of these were combined.

Management of IT Security
Information Security Plan
Identity Management
User Account Management
Security Testing and Monitoring
Security Incident Definition
Protection of Security Technology
Cryptographic Key Management
Malicious Software Prevention
Network Security
Exchange of Sensitive Data
Compliance

 

The table above includes the areas used in a CMMI model, which was recently presented to an executive leadership team. It was so well received, the CEO presented it to the board. This experience provided proof that executives are more likely to financially buy in when there are metrics showing the progress of their organization’s ISP.

Looking Ahead

ISPs are required for any business handling customer or sensitive data. In some industries, compliance programs measure the ISP, but only to specific standards. A CMMI model based on global industry standards for cybersecurity provides insight to and gauges the level of maturity of the ISP as it pertains to the enterprise.

CMMI models are gaining in popularity. They help information security teams educate executive leadership teams on how well the ISP is supported and maintained. Additionally, they can continue to provide effective protection against inside and external threats.

In summary, the CMMI model provides a bridge towards an organization’s understanding of the information security team responsible for identifying, relaying and projecting future risks as well as formulating a comprehensive and validated justification when requesting funds for future solutions.


Nigel SampsonAbout the Author: With nearly 24 years in Information Security, Nigel Sampson has gained a great depth of knowledge and experience in the Information Security realm. His roles have ranged from Network Manager and IT Director, to VP of Risk Management and Information Security Officer. Covering diverse industries such as Healthcare, Banking, Government, and Entertainment. Nigel honed his leadership skills across different organisations and has managed teams of different sizes maintaining a pace-setting but democratic management style. Over the last 10 years he built several Information Security Programs from the ground up, including deploying 6 global information security solutions for a global leader in process optimisation and assisting a federally funded transport agency reach its first Tier 1 PCI certification. He is a dedicated and passionate Information Security leader that utilises his technical and consulting skills to bind Information Security Programs to business objectives.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Understanding the Benefits of the Capability Maturity Model Integration (CMMI)” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Critical Severity, Encryption, Finance, TripWire, Vulnerability

Continue Reading

Previous Facebook’s NSO Group Lawsuit Over WhatsApp Spying Set to Proceed
Next Trading Cookies for U.S. Federal Data Privacy Regulations

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

3 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

3 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup

3 days ago [email protected] (The Hacker News)

Recent Posts

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT