Assessment Tool

Organization Information

Please provide a valid organization name.
Please provide a valid email address.

Human, Organizational, and Regulatory Aspects

Managed Level

(1)The organization follow Cyber security Authorities regulations and recommendations (or vendors) in term of cyber security.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Managed Level

(2)The organization applies policies and standards for ex; NCA policy, OPT standards, ISO standards etc.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Managed Level

(3)The organization enforce software/Internet use policies.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Managed Level

(4)The organization apply human security hygiene concept.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Managed Level

(5)The organization understand and adhere to any applicable data privacy and compliance regulations (GDPR, PCI DSS, HIPAA, etc.)

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Defined Level

(6)The organization have a qualified team to solve the vulnerabilities encountered and investigate the tickets (The organization invest in security teams).

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Defined Level

(7)The organization train employees/decision makers on healthy cyber practices.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Defined Level

(8)The organization have a solid Security Operation Center (SOC) team to detect and have 360ยบ view of the organization work.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Predictable Level

(9)The organization build use cases/scenarios in the SOC, to identify zero-day vulnerability (to identify impacted devices, or identify vulnerable devices).

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Predictable Level

(10)The organization have PURPLE team (red & blue) collaboration to discover vulnerabilities before attackers do.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Predictable Level

(11)The organization put efforts to increase awareness/educate users.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Optimizing Level

(12)The organization have an adequate Cyber Security detection, mitigation, prevention, and recovery strategy (a fully-aligned security strategy) for the business.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Optimizing Level

(13)The organization have a Research and Development team (RND) to research vulnerabilities, find zero-days, and try to fix them.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Optimizing Level

(14)The organization supports/deals with/holds Zero Day Initiative (bounty programs).

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Optimizing Level

(15)The organization security experts always stay informed: Zero day exploits aren't always publicized, but occasionally, you'll hear about a vulnerability that could potentially be exploited.

Approach
Deployment
Results
Your total score is:

Human, Organizational, and Regulatory Aspects

Optimizing Level

(16)The organization uses threat sharing resources and vulnerability disclosures to stay aware of the latest security threats and mitigate risk accordingly.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Managed Level

(1)The organization has/uses monitoring applications/Solutions.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Managed Level

(2)The organization applies input validation.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Managed Level

(3)The organization use encryption methods.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Defined Level

(4)The organization detect zero-day attacks by looking for suspicious behavior.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Defined Level

(5)The organization perform vulnerability scanning.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Defined Level

(6)The organization covers each stage in attacks lifecycle (Cyber Kill Chain).

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Defined Level

(7)The organization use/have initial solutions, or temporary solutions to limit the impact of a zero-day (until patch release).

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Defined Level

(8)The organization do NOT leave default credentials/ configurations of security tools as it is. [Regularly review system configurations]

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Predictable Level

(9)The organization has an Incident Response Plan ready.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Predictable Level

(10)The organization has Patch Management.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Predictable Level

(11)The organization invest in security control tools like DLP, Sandboxing Solutions, SPF, DMARC, DKIM, SIEM technologies etc.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Predictable Level

(12)The organization work out an emergency response solution to help quickly prevent attacks and minimize losses.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Optimizing Level

(13)The organization practices/applies defense in depth.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Optimizing Level

(14)The organization uses/applies Zero Trust security model.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Optimizing Level

(15)The organization uses MITRE framework.

Approach
Deployment
Results
Your total score is:

Attacks and Defenses

Optimizing Level

(16)The organization applies Threat intelligence.

Approach
Deployment
Results
Your total score is:

Systems Security

Managed Level

(1)The organization cares about remaining in control of your data.

Approach
Deployment
Results
Your total score is:

Systems Security

Managed Level

(2)The organization applies system security hygiene concept.

Approach
Deployment
Results
Your total score is:

Systems Security

Managed Level

(3)The organization cares about NOT sharing passwords and keys between systems.

Approach
Deployment
Results
Your total score is:

Systems Security

Defined Level

(4)The organization enforce a least privilege model.

Approach
Deployment
Results
Your total score is:

Systems Security

Defined Level

(5)The organization make sure to back up: Backups for the data itself and for the datacenter.

Approach
Deployment
Results
Your total score is:

Systems Security

Defined Level

(6)The organization applies systems baselining and hardening (for Detection).

Approach
Deployment
Results
Your total score is:

Systems Security

Predictable Level

(7)The organization cares about Resources availability which have a direct role in its ability to defend against zero-day exploits. Note: Available resources include knowledgeable security personnel, software, and hardware.

Approach
Deployment
Results
Your total score is:

Systems Security

Predictable Level

(8)The organization cares about internal systems/servers and its updates as well as external servers/systems facing the Internet.

Approach
Deployment
Results
Your total score is:

Systems Security

Optimizing Level

(9)The organization applies an objective, passive and proactive approach and keep away from subjective, predictive and reactive approaches.

Approach
Deployment
Results
Your total score is:

Systems Security

Optimizing Level

(10)The organization applies the SASE architecture.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Managed Level

(1)The organization uses only essential applications.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Managed Level

(2)The organization keeps all software, web browsers, operating system up to date. (keep updated).

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Managed Level

(3)The organization follows the idea "assume you are compromised, and that you will get compromised again".

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Managed Level

(4)The organization ensures secure code.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Defined Level

(5)The organization uses a firewall/Web Application Firewall (WAF).

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Defined Level

(6)The organization deploy an IDS or IPS (on software level).

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Defined Level

(7)The organization uses runtime application self-protection (RASP) agents.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Defined Level

(8)The organization implements browser isolation.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Defined Level

(9)The organization ensures that monitoring applications are being created automatically.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Predictable Level

(10)The organization uses a comprehensive/Next Generation antivirus software solution.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Predictable Level

(11)The organization ensures safe/secure administration of systems.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Predictable Level

(12)The organization recommends when finding a vulnerability to follow the logs and traffic on the firewalls itself, and watch the tickets itself, using multiple different ports, different protocols.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Predictable Level

(13)The organization uses โ€œheuristics-basedโ€ antivirus detection software

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Optimizing Level

(14)The organization implements Application Whitelisting.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Optimizing Level

(15)The organization deploys AI-based threat detection tools.

Approach
Deployment
Results
Your total score is:

Software and Platform Security

Optimizing Level

(16)The organization cares about patching correctly, as better patches could reduce the number of zero-days.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Managed Level

(1)The organization minimizes the number of devices facing the Internet.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Managed Level

(2)The organization uses virtual local area networks (Virtual LAN).

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Managed Level

(3)The organization uses secure ports for its network [Secure all gateways (servers, networks, email, etc.)]

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Managed Level

(4)The organization checks for unknown connection to the foreign network.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Managed Level

(5)The organization supports Comprehensive real-time Network Analysis and Visibility (NAV).

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Defined Level

(6)The organization deploys an IDS or IPS (on network level).

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Defined Level

(7)The organization implements Network Access Control.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Defined Level

(8)The organization implements IPsec, the IP security protocol.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Defined Level

(9)The organization ensures encryption of network traffic, especially the payload, to protect the integrity and confidentiality of the data in the packets traversing the network.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Defined Level

(10)The organization ensures QoS, to distribute the requests on multiple zones etc.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Predictable Level

(11)The organization adopts a multi-layered approach as its security posture.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Predictable Level

(12)The organization works on reducing its Attack Surface.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Predictable Level

(13)The organization performs network scanning continuously through penetration testing and vulnerability findings. (generate reports)

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Predictable Level

(14)The organization implements network segmentation.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Predictable Level

(15)The organization has an inventory list of the entire infrastructure in the organization, in which applications are categorized based on criticality to business.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Optimizing Level

(16)The organization adopts Endpoint Detection and Response (EDR) solutions.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Optimizing Level

(17)The organization implements single packet authorization.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Optimizing Level

(18)The organization implements monitoring for persistence techniques such as auto start extensible points, run and run once registry keys, services registration, scheduled tasks, dll hijacking.

Approach
Deployment
Results
Your total score is:

Infrastructure Security

Optimizing Level

(19)The organization implements monitoring for suspicious communication that alert for data exfiltration.

Approach
Deployment
Results
Your total score is:
The result

The organization name:

Email address:

Scope for this self-evaluation:

Additional notes:

Maturity:

Maturity

TOTAL SCORE:

# Managed Defined Predictable Optimizing
Human, Organizational, and Regulatory Aspects 0 0 0 0
Attacks and Defenses 0 0 0 0
Systems Security 0 0 0 0
Software and Platform Security 0 0 0 0
Infrastructure Security 0 0 0 0
Colors key: Mature Not mature
Total score foreach level:
Human, Organizational, and Regulatory Aspects:
Attacks and Defenses:
Systems Security:
Software and Platform Security:
Infrastructure Security: