Sie sind auf Seite 1von 2

5/6/2010 Maturity Model for Information Security…

Let's Build a Responsible Cyber Society

Break Into Cybersecurity Airtel VPN in a Box


O nline Ge orgia Te ch M.S. program , NSA- Se cure , Fle x ible , Scalable , Easy to
Visit ce rtifie d, apply today! im ple m e nt MPLS with Cisco Hardware Visit
www.ceac.in www.cc.ga te ch.e du/infose c Airte l.in/VPN/Se cure Ne twork www.arbitration.in

Maturity Model for Information Security Capability


We had discussed in the previous articles that Information Security adoption by individual employees may be mapped to
five motivational parameters namely,

1. Awareness, 2. Acceptance 3. Availability, 4. Mandate and 5. Inspiration.

Unlike the normal motivational models, the model suggested for visualization of this process for better understanding was
a “Pentagon” where each of the five factors were considered the sides that bind the IS adoption process. This was
different from the Maslow’s pyramid/triangle model or any other forms of sequential adoption of different factors.

In the current article, I add a few more thoughts on how we can build a measurement system where a Company’s level of
achievement in Information Security capability can be mapped against a model similar to the quality CMM modelling
system. This would be relevant for the purpose of auditing of the level of IS achievement. Under this model, each of the
five motivational factors are mapped against the level of achievement in a matrix as shown in the following picture.

niitimperia.com www.lumosity .com


Ads by Google Ads by Google

For example, the IS capability of a Company A may be depicted as a matrix element such as
M1L2,M2L1,M3L3,M4L1,M5L1. Company B is mapped as M1L1,M2L2,M3L2,M4L3,M5L2. Company C is
mapped as M1L4,M2L2,M3L4,M4L5,M5L2.

It may be observed that unlike the CMM model where the maturity is recognized on a stacking basis that Level 2 is after
level 1 Level 3 is after Level 2 etc, the Maturity Model for IS is suggested as a concurrent measurement over different
motivational parameters with a possiblity that a company may attain a higher maturity level in one parameter while
maintaining a lower maturity level in some other parameter.

This system of recording different maturity capabilities in different maturity parameters recognizes that, IS capability is
dependent on human beings and hence the achievement of capability is not entirely in the hands of the Company alone.
While the Company may invest in best security tools, create 100% awareness or even mandate the IS practices, it has no
control on two other parameters such as “Acceptance” and “Inspiration”. These are dependent on the employees. Hence
it may not be possible for a company to reach say L5 in all parameters simultaneously even after it exhausts all resources
under its capability.

It is possible that the complex looking matrix notation M1L2 ..etc can be replaced with a score on a base of 100 or in
any other manner. This may be done either with equal weightage on all the five parameters or with higher parameters for
“Acceptance” and “Inspiration”. The placement of any achievement in a particular level L1 to L5 may be calculated on
the basis of an estimated percentage achievement in different parameters. It may also be required to develop certain
behavioural exercises to determine the achieved level of “Acceptance”. These are for the follow up discussion.

Still it is recognized that there is scope for some subjectivity, lack of repeatability or other deficiencies in the proposed

naavi.org/…/edit_feb6_maturity_model_I… 1/2
5/6/2010 Maturity Model for Information Security…
At this point of time, the above model is introduced for further discussion. I do have some thoughts on how the different
levels of achievement of each motivational parameters which will be presented in subsequent articles. I invite other IS
practitioners to present their views so that this model can be refined further.

P.S: This article refers to the following three of my earlier articles which provide the background.

1. Techno Legal Behavioural Science Approach to Information Security

2. What motivates an individual to adopt Security

3. Theory of Motivation based on Behavioural Science Approach

Those who have not browsed through these articles may peruse the same.

Naavi

February 5, 2010

Comments are Welcome at naavi@vsnl.com

Visit Visit
www.!aavi.net www.lookalikes.in

naavi.org/…/edit_feb6_maturity_model_I… 2/2

Das könnte Ihnen auch gefallen