evolve, instantaneously altering the data from the
scoreboard, and thus permitting the enterprises
management to be aware of the situation and to
make decisions in a reasonable amount of time.
The remainder of this paper is organized as
follows: Section 2 very briefly describes existing
maturity models, their current tendencies and some
of the new proposals that are appearing. Section 3,
introduces our proposal for a maturity model
orientated towards SMEs. Section 4 we show some
of the results obtained after applying our model to
real practical cases, centring on the results obtained
to date in the phase which permits the establishment
of the enterprises current situation with regard to the
security management level. Finally, in Section 5, we
shall conclude by discussing our future work on this
subject.
2 RELATED WORK
Security maturity models (Eloff and Eloff, 2003;
Lee and Lee et al., 2003; Aceituno, 2005) seek to
establish a standardized validation with which the
state of the information security within an
organisation can be determined, and which will
allow us to plan the route which must be followed if
we are to attain the desired security goals.
Among the information security maturity models
which are most frequently applied in enterprises at
present, those which are most outstanding are the
SSE-CMM (Systems Security Engineering
Capability Maturity Model), COBIT and ISM3
(Walton, 2002), and although research has been
carried out to develop new models (Eloff and Eloff,
2003; Lee and Lee et al., 2003), none has been able
to solve the current problems which occur when
these models are applied in SMEs.
Other proposals take Risk Analysis as being the
central nucleus of ISMS (Information Security
Management System). As opposed to these models,
in our case, although Risk Analysis is highly
important, it is still only another piece in the system.
Siegel (Siegel and Sagalow et al., 2002) point out
that the information security models which centre
exclusively upon risk elimination models are not
sufficient, and Garigue (Garigue and Stefaniu, 2003)
furthermore note that at present managers not only
wish to know what has been done to mitigate these
risks, but that they should also be able to discover, in
an efficient manner, that this task has been carried
out and that costs have been reduced.
The main problem with the majority of the
maturity models mentioned is that they are not
successful when implanted in SMEs, mainly due to
the fact that they were developed for large
organisations and their associated organisational
structure. Their structures are, therefore, rigid,
complex and costly to implement, which makes
them unsuitable for an SME environment.
The vision of how to tackle these maturity levels
varies according to the authors who confront the
problem. Some authors therefore insist upon using
the ISO/IEC17799 international standard in security
management models, but always do so in an
incremental manner, considering the particular
security needs (Von Solms and Von Solms, 2001;
Walton, 2002; Eloff and Eloff, 2003; Barrientos and
Areiza, 2005).
The proposal that we have developed is also
based on the ISO27002 International Standard, but
its application is SME oriented, thus avoiding the
problems detected in current models, which require
more resources then the enterprise is able to provide,
which in its turn leads to a higher risk of failure in
implantation and maintenance, which is
unacceptable for this type of companies.
3 MODEL
Earlier versions of the model have been presented in
previous papers (Sánchez and Villafranca et al.,
2007a). Therefore, in this section we present a
highly resumed description of the models principal
phases.
The Information Security Maturity Model that
we propose allows any organisation to evaluate the
state of its security, but is mainly oriented towards
SMEs through the development of security
management models which are simple, economical,
rapid, automated, progressive and sustainable, these
being the main requirements of this type of
companies when implanting these models.
One of the objectives in the development of the
entire process is that of obtaining the greatest
possible level of automation with the minimum
amount of information collected in the shortest
possible time. In our system we have prioritized
speed and cost reduction, thus sacrificing the
precision offered by other models, which is to say
that our model seeks one of the best security
configurations, but not that which is optimum, and
time and cost reduction are always prioritized.
Another of the major contributions of our model
is a set of matrices which allows us to relate the
different components of the ISMS that the system
uses to automatically generate a great part of the
necessary information, thus notably reducing the
time needed to develop and implant the ISMS.
SECRYPT 2008 - International Conference on Security and Cryptography
392