
and differences are observed. (Moreira et al., 2021)
presents the following order of priorities: DE.DP-1,
DE.DP-2, DE.DP-4, DE.DP-5, DE.DP-3.
This demonstrates that both the most priori-
tized subcategory, DE.DP-1, and the least important,
DE.DP-3, held similar positions. However, the re-
maining subcategories appeared in different orders.
This same phenomenon was also observed in the eval-
uation of the DE.AE category.
After completing all alternative evaluations by the
experts, the global result was obtained through the
AHP calculation, reflecting the prioritization of sub-
categories based on the assigned weights and evalu-
ated criteria. This result was then analyzed in detail,
enabling the identification of the most relevant sub-
categories within the Detect function of the CSF. The
global analysis, calculated using the AHP method,
consolidated the decisions made during the prioriti-
zation process, highlighting the critical controls that
should be implemented to strengthen the organiza-
tion’s cybersecurity.
The global scale result provided a list prioritiz-
ing the cybersecurity controls for the organization.
The list indicates which controls should be priori-
tized. Highlighted are controls DE.CM-4: Malicious
code is detected and DE.CM-5: Unauthorized mo-
bile code is detected. This suggests that the ability to
detect threats involving malicious code and unautho-
rized mobile code is a critical priority for ensuring the
early identification of potential attacks. This empha-
sis is crucial, as failures in these areas may compro-
mise system security, allowing attacks to occur with-
out timely detection.
Subsequently, the DE.CM-8 subcategory, ”Vul-
nerability scans are performed,” achieved a score of
15%. This result highlights that the detection of
known vulnerabilities and potential system flaws is
considered a critical area. The prioritization of ac-
tions aimed at conducting vulnerability scans under-
scores the importance of identifying and mitigating
weaknesses before they can be exploited, reinforcing
a proactive approach to cybersecurity.
Specifically for the categories DE.CM-1 (10%)
and DE.AE-2 (6%), which ranked fourth and fifth re-
spectively, provide important insights into their rela-
tive priorities in the context of threat detection. The
10% weight of DE.CM-1 indicates that continuous
network monitoring to detect cybersecurity events is
highly relevant, though not the top priority. This
suggests that while network monitoring is crucial for
identifying incidents, other controls, such as mali-
cious code and vulnerability detection, are considered
more critical for providing immediate defense against
specific threats.
Conversely, the fifth position of DE.AE-2, ac-
counting for 6%, highlights the importance of ana-
lyzing detected events not only to understand their
potential impacts but also to identify the specific tar-
gets and methods employed in the attack. Such in-
depth analysis is essential for the development of ef-
fective response and mitigation strategies. However,
despite its critical role, this aspect is assigned a com-
paratively lower priority within the broader detection
framework, relative to other mechanisms.
These rankings highlight that organizations may
focus more on direct defensive actions against known
or high-risk threats, while practices like network
monitoring and behavioral analysis provide crucial
support but are not the frontline of defense.
Among the controls with intermediate scores,
DE.DP-1 (5%) and DE.AE-3 (5%) stand out. The
control DE.DP-1, which addresses the definition of
roles and responsibilities to ensure accountability in
detection, indicates that the organization considers it
essential to clearly establish responsibilities, although
this is not a primary focus of action.
Similarly, DE.AE-3, related to the collection and
correlation of event data from multiple sources and
sensors, also scored 5%, reflecting the importance of
consolidating information for security event analysis.
Both controls are crucial for effective incident man-
agement, but their intermediate score suggests that the
organization has prioritized other, more critical areas,
such as the detection of malicious code.
Controls with slightly lower scores, such as
DE.CM-3 (4%), DE.CM-6 (3%), DE.CM-7 (3%),
DE.DP-4 (3%), DE.AE-4 (3%), and DE.AE-1 (3%),
also represent relevant areas. DE.CM-3, which in-
volves monitoring personnel activity, and DE.CM-
6, which concerns monitoring external service
providers’ activity, indicate that the organization ac-
knowledges the importance of overseeing human and
third-party activities, though these areas received
lower priority.
The control DE.CM-7, which relates to monitor-
ing unauthorized connections, devices, and software,
along with DE.AE-4, which determines the impact of
events, were also rated at 3%. This reflects that while
these activities are recognized, the organization may
be focusing on actions more directly related to threat
detection, such as those concerning malicious code
and vulnerabilities. Figure 7 illustrates the prioritiza-
tion of controls and provides a visual representation
of the scenario previously described.
Sensitivity analysis is essential for verifying the
robustness of the results obtained after applying the
AHP method, ensuring that security control decisions
are consistent and reliable. After obtaining the results,
Cybersecurity Risk Assessment Through Analytic Hierarchy Process: Integrating Multicriteria and Sensitivity Analysis
125