Comparative analysis ofmaturity models to evaluate information security

Authors

  • Михайло Володимирович Коломицев NTUU "KPI"
  • Світлана Олександрівна Носок NTUU "KPI"
  • Роман Олександрович Тоцький NTUU "KPI"

DOI:

https://doi.org/10.18372/2410-7840.21.14337

Keywords:

information security, maturity model, ISO 27001, ISMS, comparative analysis, metrics

Abstract

Information security can be defined as: the protection of information assets by processing risks of violating the confidentiality, integrity and availability of information that is processed, stored and transmitted between interconnected information systems; and a process that includes preventing, detecting and responding to information security threats. In world practice, the concept of maturity model is used to determine the stage of organizational and technological development of an organization and its processes. To measure the state of the process, a set of metrics is used that represent certain characteristics. Evaluation of these metrics according to the established scale shows the state of the processes, which will characterize the level of their maturity. In world practice, in contrast to Ukrainian practice, the application of the maturity model for managing information security processes is widespread. An example of this is the ISO27000 series of standards that governs information security management issues implemented on the basis of the Information Security Management System. Obviously, before an organization engaged in information security management, sooner or later the question arises of how to fulfill these requirements, to what extent and at what level of detail, etc. Maturity model can help to answer these and other questions, on the basis of which the level of maturity of information security processes will be evaluated. To identify the main models of information security maturity, an analysis of open sources and best practices related to information security maturity models was carried out. Based on the results of the analysis of the sources, the most applicable models of information security maturity were determined, namely: SSE-CMM, C2M2, NICE and OISM3.

Author Biographies

Михайло Володимирович Коломицев, NTUU "KPI"

candidate of technical sciences, associate professor of Institute of Physics and Technologies of the NTUU "KPI"

Світлана Олександрівна Носок, NTUU "KPI"

candidate of technical sciences, associate professor of Institute of Physics and Technologies of the NTUU "KPI"

Роман Олександрович Тоцький, NTUU "KPI"

student of the Institute of Physics and Technologies of the NTUU "KPI"

References

Select Business Solutions. [Electronic resource]. Accecc: http://www.selectbs.com/ process-maturity/

what-is-the-capability-maturity-model.

M. Lessing: Best practices show the way to

Information Security Maturity. [Electronic resource].

Accecc: http:// researchspace. csir. co. za/ dspace/

bitstream/handle/10204/3156/Lessing6_2008.pdf?s

equence=1&isAllowed=y.

G. White, "The community cyber security maturity

model". In: IEEE International Conference on Technologies

for Homeland Security, pp. 173-178, 2011.

SSE-CMM. [Electronic resource]. Accecc:

https://pqm-online.com/assets/files/lib/std/gost_

r_iso_mek_21827-2010.pdf.

Department of Energy: Cybersecurity Capability Maturity

Model (C2M2): Version 1.1, Department of Homeland

Security, 2014.

US Department of Homeland Security.: Cybersecurity

Capability Maturity Model: Version1.0. White paper,

Department of Homeland Security, 2014. [Electronic

resource]. Accecc: https://niccs.us-cert.gov/sites/

default/ files/ Capability%20 Maturity% 20Model%

White%20Paper.pdf?trackDocs=Capability%20M

aturity%20Model%20White%20Paper.pdf.

The Open Group.: Open Information Security

Management Maturity Model (O-ISM3). Technical

report, Open Group, 2017.

Н. Милославская, Р. Сагиров, Обзор моделей зрелости процессов управления информационной безопасностью.

Published

2019-12-27

Issue

Section

Articles