some cybersecurity maturity mechanisms have been
suggested to reduce the impact of cyberattacks,
considering country level protection. Moreover,
regional, and international organizations have
conducted other studies, but they aim on score and
ranking countries corresponding to their national-
level cybersecurity top systems. CMM aims to find
methods for developing the company's protection and
introduce a level-based advancement approach.
Zero Trust satisfies these significant
characteristics by treating all users, devices, data, and
service requests similarly. It shifts from the
traditional security policy of all assets in an
organization being open and accessible to requiring
continuous authentication and authorization for any
asset to be accessible. Most existing corporate
networks are flat. The weakness of the traditional
hub-and-spoke network model lies in its architecture.
Crossing the chasm from trust to distrust via a firewall
is inherently risky. Instead, Zero Trust no longer
distinguishes between “inside” and “outside” the
network perimeter. A Zero Trust Architecture (ZTA)
addresses this trend by focusing on protecting
resources, not network perimeters, as the network
location is no longer viewed as the prime component
to the security posture of the resource.
In other words, Zero Trust is a set of cybersecurity
principles used to create a strategy that focuses on
moving network defences from wide, static network
perimeters to concentrating more narrowly on users,
systems, and individual or small groups of resources.
In this respect, we are eliminating the concept of
trust within the network and believe there are no more
trusted interfaces, users, packets, and applications.
Across the industries, security professionals are
shifting the security diameter to zero security trust
state of mind and quick adopting the approach of Zero
Trust security network model. It is notable that Zero
Trust is more than just concept. It is a robust security
model that follows 7 security important principles:
Data, Devices, Workload, Automation and
Orchestration, Visibility and Analytics, Users, and
Network (Alalmaie, et al., 2022).
The rest of the paper is organized as follow. In
section 2, some of the main related works are studied.
In section 3, the Zero Trust concept is explained
briefly. The chosen approach and the proposed
method are presented in sections 4 and 5, respectively.
In section 6, the used evaluation methods are
mentioned. Next, experimental results are reported in
section 7. Eventually, in section 8, a conclusion and
some future works are given.
2 RELATED WORKS
The Systems Security Engineering Capability
Maturity Model (SSE-CMM) was designed on the
CMM paradigm to evaluate assurance of security
engineering procedures and capability for customers
as a standard mechanism. THE SSE-CMM prevents
organizational security by having various features
(Nahari and Krutz, 2003).
The Community Cyber Security Maturity Model
(CCSMM) was proposed to tackle various problems
related to information sharing, metrics, training,
testing, technology, random threats, structured risks,
and well-structured risks. The CCSMM is designed
based on comprehensive working experience with
communities/states emerging and implementing
cybersecurity practices, and it has five maturity levels
as security awareness, process development,
information availability, tactics development, and full
security operational capability (White, 2011).
In (Eusgeld, et al., 2011), researchers examined
the weaknesses associated with the combination of
industrial control systems and the underlying critical
infrastructures. Plus, an integrated model was
suggested to address the selection of the suitable
method, and it investigate interdependencies between
the critical infrastructures.
In (Mettler and Blondiau, 2012), authors
proposed a maturity model to measure the skill levels
of federal important infrastructure safety attempts,
taking the maturity measures based on the obtained
core causes into consideration. The model did analyse
of data concerning to nationwide cybersecurity
developments through base level technique to obtain
the fundamental reasons of the vulnerability of vital
infrastructures to cyber risks. More, it confirms the
maturity standards by proposing the effects to
specialists according to a Delphi survey.
In (Karabacak, et al., 2016), authors have focused
on the advancement of a wide-ranging maturity
mechanism to apply in the Hospital Information
System (HIS) environment. Thus, they discussed on
different problems, like most important influencing
factors by information system managers, which are
associated to the maturity phases and maturity-
affecting element assessment in the perspective of the
maturity periods. Plus, they suggested HIS Maturity
Model (HISMM). They prepared a questionnaire to
understand the critical infrastructure requirements,
using the design science research methodology.
Further, they conducted a survey, considering
different categories and designed an initial maturity
model. Moreover, they implemented a qualitative
assessment technique for interviews to attempt and