Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Abstract
:1. Introduction
1.1. The Concept of Maturity and Maturity Models
- Process-related maturity models (PMM): These models focus on the level of maturity of an organisation’s processes and are typically used in areas such as project management, software development, and quality assurance. One of the first widely used and popular process-oriented maturity models was the Capability Maturity Model (CMM), introduced by the Software Engineering Institute [25] and originally proposed to objectively assess the software development process. Many existing maturity models have their roots directly in the CMM and have adopted its five-level approach (level 1—initial, level 2—managed, level 3—defined, level 4—quantitatively managed, and level 5—optimised), which describes an evolutionary path of increasingly organised and systematic maturity stages. As expressed by [14], PMM has become a prosperous approach to support business process management (BPM). A comprehensive overview of BPM maturity models is provided by [26,27,28], while an SLR of BMP maturity models for small and medium-sized enterprises (SMEs) was prepared by [11]. PMMs are frequently applied to the field of information systems (IS) and information system management (ISM). A systematic review of experience and findings in this area of maturity assessment can be found in the following studies: [18,29,30];
- Technology-related maturity models: This category includes maturity models and frameworks that are used to assess and improve the maturity of an organisation’s technological capabilities. An important group in this category are models focussed on the maturity of IT. A comprehensive review of IT-related maturity models is provided by [31,32]. There are also contributions focussing on specific technology segments or specialised products (e.g., Industry 4.0 [33] or Industry 5.0 [34]). As [35] stated, organisations are facing increasing cyber security risks in the context of Industry 4.0 and 5.0, making it essential to adopt tailored risk management methodologies such as the NIST Cybersecurity Framework (NIST CSF), ISO/IEC 27001, and MAGERIT;
- Data maturity models: These models assess an organisation’s level of maturity in managing and using data. A survey of maturity models in data management was prepared by [36]. A multivocal literature review of the maturity of open government data maturity is provided by [37], while [38] prepared an SLR on big data maturity assessment models;
- Resilience maturity models: This category includes maturity models and frameworks that help organisations assess and improve their ability to anticipate, prepare for, respond to, and recover from disruptions or crises. These models typically provide a set of best practices and benchmarks that organisations can use to evaluate their current resilience capabilities and identify areas for improvement. Examples of such approaches can be found in [42,43,44]. Moreover, this article examines relevant cyber security capability maturity models to identify the standards and controls available to providers of critical infrastructure, to improve their level of security preparedness. Information/cyber security maturity models that are the focus of our research (to be discussed in more detail in the next section) could be assigned to this category.
- “One-size-fits-all” approach: Maturity models are often designed to be generic and applicable across multiple industries and contexts. However, this means that they may not account for the unique characteristics of each organisation, such as their culture, size, or goals. In addition, maturity models have often been characterised as ’step-by-step recipes’ that simplify business reality [52];
- Static and inflexible [45]: Maturity models tend to be static and prescriptive in nature, providing a linear path for organisations to follow. However, this may not be suitable for complex and rapidly changing environments, where a more flexible and adaptive approach may be necessary;
- Lack of empirical evidence [9,52,53]: Many maturity models are based on expert opinions and best practices, rather than empirical evidence. As a result, their effectiveness in improving organisational performance may not be well supported by data. As cited in [11,53] observed that empirically validated maturity models are quite rare;
- Limited scope and lack of a systematic approach [54]: Maturity models typically focus on a specific area or function within an organisation, such as IT or project management. This may lead to a narrow perspective on organisational maturity and overlook other important factors that affect organisational performance;
- Narrow “compliance-oriented” approach: Maturity models often prioritise compliance and conformity over innovation and creativity. This may discourage organisations from pursuing novel approaches and taking risks, which can be important for staying competitive in today’s fast-paced business environment. Maturity models should not focus on a series of levels toward a predetermined ‘final state’ but on the factors that influence evolution and change [11,55].
1.2. Information/Cyber Security Maturity Models
- Risk Management: Organisations need to identify, assess, and manage information and information/cyber security risks. This includes conducting risk assessments, implementing risk management processes and procedures, and continuously monitoring and updating the risk management programme. Representatives of such studies are [62,63,64];
- Third-party risk management: Organisations need to manage information and cyber security risks associated with third-party vendors and suppliers. This includes assessing third-party risks, implementing controls to mitigate those risks, and monitoring third-party security posture over time. As an example, we can expose studies dealing with maturity associated with cloud service risks [73,74].
2. Research Methodology
3. Planning the Review
- RQ1: What are the general trends of ICS MM studies during the last twelve years (i.e., yearly distribution of publications (conference papers and research articles), distribution of publications by industry, or by information/cyber security domain, etc.)?
- RQ2: How can recent studies on ICS MMs be categorised based on their contributions to the development of information/cyber security maturity assessment?
- RQ3: In which sectors and industries have ICS MMs been applied most effectively and what type of organisations have found the concept of information/cyber security maturity assessment useful?
- RQ4: What are the key drivers for ICS MM adoption?
- RQ5: What are the main gaps or limitations that the authors have identified regarding the implementation of ICS MMs in organisations?
- RQ6: What opportunities and future research directions in the field of information/cyber security maturity assessment have the authors identified?
4. Conducting the Review
5. Reporting the Review
5.1. Quantitative Analysis
5.2. Qualitative Synthesis
6. Discussion and Research Questions Analysis
6.1. Findings from the Quantitative Analyses of SLR Results
6.2. Findings from the Qualitative Synthesis of SLR Results
- RQ2: How can recent studies on ICS MMs be categorised based on their contributions to the development of information/cyber security maturity assessment?
- RQ3: In which sectors and industries have ICS MMs been applied most effectively and what type of organisations have found the concept of information/cyber security maturity assessment useful?
- RQ4: What are the key drivers for ICS MMs adoption?
- RQ5: What are the main gaps or limitations that the authors have identified regarding the implementation of ICS MMs in organisations?
- RQ6: What opportunities and future research directions in the field of information/cyber security maturity assessment have the authors identified?
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
Abbreviation | Definition |
AISMA | Advanced Information Security Maturity Assessment |
BCM | Business Continuity Management |
BPM | Business Process Management |
C2M2 | Cybersecurity Capability Maturity Model |
CET | Cyber Security Evaluation Tool |
CMM | Capability Maturity Model |
CMMI | Capability Maturity Model Integration |
CRMM | Cybersecurity Resilience Maturity Measurement |
CSCMM | Cyber Security Capability Maturity Model |
CTI | Cyber Threat Intelligence |
CTI-SOC2M2 | Cyber Threat Intelligence-driven SOC Maturity Model |
CTP | Cyber Trust Program |
CyFEr | Cybersecurity Vulnerability Mitigation Framework Through Empirical Paradigm |
DCCI | Dynamic Capabilities in Cybersecurity Intelligence |
DFR | Digital Forensic Readiness |
DSR | Design Science Research |
EC | Exclusion Criteria |
EPGA | Enhanced Prioritised Gap Analysis |
F4SLE | Framework for Security Level Evaluation |
GDPR | General Data Protection Regulation |
HCYMAF | Holistic Cybersecurity Maturity Assessment Framework |
HDM | Hierarchical Decision Model |
HEI | Higher Education Institution |
HIPAA | Health Insurance Portability and Accountability Act |
IC | Inclusion Criteria |
ICS MM | Information and Cyber Security Maturity Models |
ICT | Information Communication Technology |
IoT | Internet of Things |
IPCA | Information Protection Culture Assessment |
IRM3 | Incident Response Management Maturity Model |
IS | Information System |
ISFAM | Information Security Focus Area Maturity |
ISM | Information System Management |
ISM MM | Information Security Management Maturity |
ISMS | Information System Management System |
IT | Information Technology |
IT-CMF | IT Capability Maturity Framework |
JCR | Journal Citation Reports |
LiSRA | Lightweight Security Risk Assessment |
MAISMMC | Method for Adaptive Information Security Maturity Modelling in Clusters |
MIL | Maturity Indicator Level |
MITRE ATT&CK | Globally accessible knowledge base of adversary tactics and techniques based on real-world observations |
NIST CSF | National Institute of Standards and Technology Cybersecurity Framework |
NREN | National Research and Education Networks |
NSIC | Network Security Intelligence Center |
OC | Organisational Characteristics |
OMM | Organisational Maturity Models |
PMM | Process Related Maturity Models |
PRISMA | Preferred Reporting Items for Systematic Reviews and Meta-Analyses |
ProGReSS | Promoting Global Cyber Resilience for Sectors and Society |
SCMAF | Cybersecurity Maturity Assessment Framework |
SLR | Systematic Literature Review |
SME | Small and Medium-Sized Enterprise |
SOC | Security Operations Center |
SPICE | Software Process Improvement and Capability Determination |
Appendix A
ID | Title | Reference | Domain | Short Description of the Study |
---|---|---|---|---|
RA1 | Maturity assessment and process improvement for information security management in small and medium enterprises | [100] | IS | The study proposes a method adapted to small and medium enterprises (SMEs) to conduct a first assessment of the enterprise’s information security maturity and improve its process accordingly. |
RA2 | A Framework for Information Security Governance and Management | [60] | IS | The authors present a practitioner-oriented ISGM capability maturity framework that incorporates technical, process, and human dimensions. The framework is underpinned by the premise that the pace and manner with which an organisation can proactively respond to new and emerging security threats depends on the maturity of its ISGM capability. |
RA3 | A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness | [102] | CS | This paper proposes a maturity model for measuring the readiness levels of national critical infrastructure protection efforts in Turkey. The development of the model involves two steps. The first step analyses data pertaining to national cyber security projects using grounded theory to extract the root causes of the susceptibility of critical infrastructures to cyber threats. The second step determines the maturity criteria by introducing the root causes to subject matter experts polled in a Delphi survey. |
RA4 | Advanced approach to information security management system utilising maturity models in critical infrastructure | [101] | IS/CS | The authors have developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. |
RA5 | “Security Concern” as a Metric for Enterprise Business Processes | [103] | IS | The authors introduce a novel security metric (Security Concern) to assess the business process security. The metric quantitatively measures the “concern” due to various attributes of the security of a business process in the context of the threat scenario and asset sensitivity. |
RA6 | Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework | [104] | CS | The study presents the conceptual design for a cyber security resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as a part of cyber risk management treatment. |
RA7 | Cybersecurity for railways—a maturity model | [105] | CS | The authors have developed the Railway-Cybersecurity Capability Maturity Model (R-C2M2) which is based on the C2M2. The application of this model allows railway organisations to improve their capability to reduce the impacts of cyber attacks and eradicate vulnerabilities. The approach can also be extended to other infrastructures with necessary adaptations. |
RA8 | Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced Prioritised Gap Analysis | [106] | CS | The authors have developed a framework and software application called the Cybersecurity vulnerability mitigation framework through an empirical paradigm (CyFEr). The detailed architecture of CyFEr’s Enhanced Prioritised Gap Analysis (EPGA) methodology and its application to CSF are presented in the paper. |
RA9 | A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom | [97] | IS/CS | The study presents a light, web-based Holistic Cybersecurity Maturity Assessment Framework that can be used as a cyber security assessment tool for Higher Education Institutes (HEIs) in the United Kingdom. The framework incorporates all security and privacy regulations, as well as best practices that HEIs must comply with. It can be used as a self-assessment or a cyber security audit tool. |
RA10 | A real-world information security performance assessment using a multidimensional socio-technical approach | [61] | IS | The study aims to present and validate the ISP 10×10M model used for evaluating the performance of information security in organisations. |
RA11 | Calculated risk? A cybersecurity evaluation tool for SMEs | [107] | CS | The authors propose a cyber security evaluation tool (CET) which can be used for cyber security risk assessment in SMEs. The tool consists of a 35-question online survey to be completed by IT leaders to self-rate their maturity within the five NIST framework categories: identify, protect, detect, respond, and recover. |
RA12 | Cybersecurity Vulnerability Mitigation Framework Through Empirical Paradigm (CyFEr): Prioritised Gap Analysis | [108] | CS | The content of the paper is similar to the paper RA8. The authors have developed a framework and a software application CyFEr. A detailed architecture of CyFEr is presented, as well as its application to CSF. |
RA13 | LiSRA: Lightweight Security Risk Assessment for decision support in information security | [109] | IS | The authors propose the LiSRA framework to aid information domain-specific security decision-making. It incorporates domain-specific information provided by experts, allowing users to focus on specifying their security practices and organisational characteristics. This information is linked to attack paths and adverse impacts to assess the overall risk. |
RA14 | Modelling adaptive information security for SMEs in a cluster | [98] | IS | The paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organisational characteristics (OCs) of a SME cluster. The purpose is to provide SMEs with a tailored maturity model enabling them to capture and improve their information security capabilities. |
RA15 | Towards a Capability Maturity Model for Digital Forensic Readiness | [110] | IS/CS | The study provides a capability maturity model (CMM) to assess the current state of initiatives in digital forensic readiness (DFR). As such, this model shows guidance to turn efforts in the right direction. |
RA16 | Towards Development of a Cyber Security Capability Maturity Model | [111] | IS/CS | The authors have performed a critical analysis of nine contemporary maturity models to develop a new maturity model, i.e., the cyber security capability maturity model (CSCMM). |
RA17 | Adopting security maturity model to the organisations’ capability model | [112] | IS/CS | An Information Security Management model is proposed that classifies the organisations into five levels. Each level determines the technologies and process capability used by the organisations. There is a set of factors that can help in determining the security maturity level, such as technology, people, and infrastructure. |
RA18 | CTI-SOC2M2—The quest for mature, intelligence-driven security operations and incident response capabilities | [66] | CS | The authors have developed a capability maturity model CTI-SOC2M2 that uses the degree of cyber threat intelligence (CTI) integration as a proxy for security operations service maturity. They examined existing maturity models in the domains of Security Operations Centers (SOCs), incident response, and CTI. |
RA19 | Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia | [113] | IS/CS | The paper proposes a SCMAF for higher education institutions in Saudi Arabia. SCMAF is a comprehensive, customised security maturity assessment framework aligned with local and international security standards. It can be used as a self-assessment method to establish the security level and highlight the weaknesses and mitigation plans that need to be implemented. |
RA20 | Incorporating Systems Thinking Into a Cyber Resilience Maturity Model | [114] | CS | The paper aims to address the challenge of achieving cyber resilience in critical infrastructure. It proposes a systems thinking approach, viewing critical infrastructure as a system of systems. The authors suggest exploring cyber resilience as a system property, considering the multiple dimensions of operation and different domains of practice within the sector. They discuss the concepts of dimensions of operation and domains of practice, which are incorporated into a sectoral cyber resilience maturity model. |
RA21 | Maturity level assessments of information security controls: an empirical analysis of practitioners assessment capabilities | [6] | IS | The authors have conducted a case study to verify the quality of maturity level assessments where security experts assessed a subset of the ISO/IEC 27002 security controls for a hypothetical scenario using the COBIT maturity levels. |
RA22 | CAESAR8: An Agile Enterprise Architecture Approach to Managing Information Security Risks | [64] | IS | The authors describe a novel approach that supports dynamic and holistic reviews of information security risks in IT projects, based on a checklist that assesses the maturity of security considerations in eight domains that often cause information security failures. |
RA23 | Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review | [5] | CS | The authors have conducted an SLR which revealed the lack of an end-to-end cyber security maturity assessment framework for technology startups. |
RA24 | Information Security Management Maturity Models | [75] | IS | The study compares eight different maturity models (The Bank of Russia’s ISM MM, ISMS Maturity Capability Model, NIST’s IS MM, Open Group’s ISM MM, Gartner’s Security and Risk Management ML assessment, IS Risk Management Process MM, Security Incident Management Models, and IS Monitoring MM). Comparison results are intended to be used for developing a new maturity model for Network Security Intelligence Centers (NSICs). |
RA25 | Information Security Maturity Model for Healthcare Organisations in the United States | [96] | IS | Following the hierarchical decision model (HDM) approach, the authors have provided a new maturity model for information security for healthcare organisations in the United States. |
RA26 | Managing the Inevitable—A Maturity Model to Establish Incident Response Management Capabilities | [65] | IS/CS | The authors have followed a design science research (DSR) approach to develop an incident response management maturity model (IRM3). The proposed model is closely aligned with practice requirements under a socio-technical lens. |
RA27 | Determining cybersecurity culture maturity and deriving verifiable improvement measures | [115] | CS | The authors analyse how to measure and improve the cyber security culture in a company. Using two surveys, the authors assessed the maturity of cyber security and introduced measures to improve key areas such as accountability and policy effectiveness. |
RA28 | Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats | [116] | CS | The study proposes a Dynamic Capability in Cybersecurity Intelligence (DCCI) model to improve organisations’ protection against cyber threats. The paper summarises 47 case studies to identify technological, organisational, and management capabilities that help build cyber security intelligence and reduce cyber risks. |
RA29 | Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks | [117] | IS | The study presents a security baseline model for European National Research and Education Networks (NRENs). The authors have developed a security maturity model tailored to research and education institutions by applying taxonomic design principles to align security baseline requirements with various international security regulations such as ISO and GDPR. |
RA30 | The impacts of the Cyber Trust Program on the cybersecurity maturity of government entities in the Kingdom of Bahrain | [118] | CS | The authors examine the CTP in Bahrain. The study concludes that the CTP has significantly improved cyber security awareness, reduced cyberattacks, and optimised resources in government entities, with strong support from top management being critical to its success. |
RA31 | Zero trust cybersecurity: critical success factors and a maturity assessment framework | [119] | CS | The study identifies the key success factors for implementing zero trust cyber security and presents an eight-dimensional framework to guide organisations in assessing and improving their zero trust maturity, covering areas such as identity, endpoints, data, and infrastructure. |
RA32 | A logging maturity and decision model for the selection of intrusion detection cyber security solutions | [120] | IS/CS | The authors propose a model to help organisations select appropriate intrusion detection and logging solutions based on their needs and constraints. They introduce a logging maturity model and a decision model that incorporates factors such as cost, complexity, and compliance to help organisations, especially SMEs, improve their cyber security capabilities. |
RA33 | Create your own MUSE: a method for updating security level evaluation instruments | [121] | IS | The study introduces MUSE, a method for updating security evaluation instruments to maintain their validity and ensure result comparability over time. The method was tested with a case study updating the F4SLE (Framework for Security Level Evaluation) instrument based on the Estonian Information Security Standard and cross-referenced with ISO 27002 controls. |
RA34 | Managing security evidence in safety-critical organisations | [122] | IS/CS | The authors analyse how security evidence is managed in safety-critical industries such as the automotive industry and medical technology. They highlight the challenges associated with the complexity of managing security artefacts and point to the need for structured processes and potential automation to meet growing regulatory requirements. |
RA35 | Resilience-driven Cyber-physical Risk Assessment and Investment Planning for Power Substations | [123] | CS | The study is based on the C2M2, which is used to assess the cyber security readiness and capability of power substations. The model uses maturity indicator levels (MILs) to quantify vulnerabilities and inform cyber security investment decisions to improve the resilience of cyber-physical systems in power substations. |
RA36 | Should firms invest more in cybersecurity? | [124] | CS | The authors analyse the relationship between investments in cyber security and cyber incidents in Dutch companies. They use survey data and administrative tax records to assess how cyber security maturity affects the likelihood of incidents and profitability. The study finds an inverted U-shaped relationship, where higher levels of cyber security maturity initially lead to more incidents due to better detection, but the highest levels of maturity reduce incident rates. However, the study found no significant correlation between cyber security measures and firms profitability. |
References
- De Matteis, J.; Elia, G.; Del Vecchio, P. Business Continuity Management and Organizational Resilience: A Small and Medium Enterprises (SMEs) Perspective. J. Conting. Crisis Manag. 2023, 31, 670–682. [Google Scholar] [CrossRef]
- Bhamra, R.; Dani, S.; Burnard, K. Resilience: The Concept, a Literature Review and Future Directions. Int. J. Prod. Res. 2011, 49, 5375–5393. [Google Scholar] [CrossRef]
- Groenendaal, J.; Helsloot, I. Cyber Resilience during the COVID-19 Pandemic Crisis: A Case Study. J. Conting. Crisis Manag. 2021, 29, 439–444. [Google Scholar] [CrossRef]
- Sánchez, M.A.; De Batista, M. Business Continuity for Times of Vulnerability: Empirical Evidence. J. Conting. Crisis Manag. 2023, 31, 431–440. [Google Scholar] [CrossRef]
- Marican, M.N.Y.; Razak, S.A.; Selamat, A.; Othman, S.H. Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review. IEEE Access 2023, 11, 5442–5452. [Google Scholar] [CrossRef]
- Schmitz, C.; Schmid, M.; Harborth, D.; Pape, S. Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners Assessment Capabilities. Comput. Secur. 2021, 108, 102306. [Google Scholar] [CrossRef]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. Int. J. Surg. 2010, 8, 336–341. [Google Scholar] [CrossRef] [PubMed]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Mettler, T. Maturity Assessment Models: A Design Science Research Approach. Int. J. Soc. Syst. Sci. 2011, 3, 81–98. [Google Scholar] [CrossRef]
- Mettler, T.; Rohner, P.; Winter, R. Towards a Classification of Maturity Models in Information Systems; D’Atri, A., De Marco, M., Braccini, A.M., Cabiddu, F., Eds.; Physica-Verlag HD: Heidelberg, Germany, 2010; pp. 333–340. [Google Scholar]
- Virkkala, P.; Saarela, M.; Hänninen, K.; Kujala, J.; Simunaniemi, A.-M. Business Maturity Models for Small and Medium-Sized Enterprises: A Systematic Literature Review. Management 2020, 15, 137–155. [Google Scholar] [CrossRef]
- Becker, J.; Knackstedt, R.; Pöppelbuß, J. Developing Maturity Models for IT Management. Bus. Inf. Syst. Eng. 2009, 1, 213–222. [Google Scholar] [CrossRef]
- Iversen, J.; Nielsen, P.; Nørbjerg, J. Situated Assessment of Problems in Software Development. ACM SIGMIS Database Database Adv. Inf. Syst. 1999, 30, 66–81. [Google Scholar] [CrossRef]
- Roeglinger, M.; Poeppelbuss, J.; Becker, J. Maturity Models in Business Process Management. Bus. Process Manag. J. 2012, 18, 328–346. [Google Scholar] [CrossRef]
- Wendler, R. The Maturity of Maturity Model Research: A Systematic Mapping Study. Inf. Softw. Technol. 2012, 54, 1317–1339. [Google Scholar] [CrossRef]
- Felch, V.; Asdecker, B.; Sucky, E. Maturity Models in the Age of Industry 4.0—Do the Available Models Correspond to the Needs of Business Practice? In Proceedings of the 52nd Hawaii International Conference on System Sciencesm, Maui, HI, USA, 8–11 January 2019. [Google Scholar]
- Leino, S.-P.; Kuusisto, O.; Paasi, J.; Tihinen, M. VTT Model of Digimaturity. In Towards a New Era in Manufacturing; VTT Technical Research Centre of Finland Ltd.: Espoo, Finland, 2017; pp. 41–46. ISBN 978-951-38-8514-4. [Google Scholar]
- Proença, D. Methods and Techniques for Maturity Assessment. In Proceedings of the 2016 11th Iberian Conference on Information Systems and Technologies (CISTI), Gran Canaria, Spain, 15–18 June 2016; pp. 1–4. [Google Scholar]
- De Bruin, T.; Rosemann, M.; Freeze, R.; Kaulkarni, U. Understanding the Main Phases of Developing a Maturity Assessment Model. In Proceedings of the 16th Australasian Conference on Information Systems (ACIS); Sydney, NSW, Australia, 29 November–2 December 2005, Bunker, D., Campbell, B., Underwood, J., Eds.; Australasian Chapter of the Association for Information Systems: CD Rom; Queensland University of Technology: Brisbane, QLD, Australia, 2005; pp. 8–19. [Google Scholar]
- Tocto-Cano, E.; Paz Collado, S.; López-Gonzales, J.L.; Turpo-Chaparro, J.E. A Systematic Review of the Application of Maturity Models in Universities. Information 2020, 11, 466. [Google Scholar] [CrossRef]
- Lee, D.; Gu, J.-W.; Jung, H.-W. Process Maturity Models: Classification by Application Sectors and Validities Studies. J. Softw. Evol. Process 2019, 31, e2161. [Google Scholar] [CrossRef]
- Adekunle, S.; Ejohwomu, O.; Ikuabe, M.; Fatai, O. A Critical Review of Maturity Model Development in the Digitisation Era. Buildings 2022, 12, 858. [Google Scholar] [CrossRef]
- Kucińska-Landwójtowicz, A. Organizational Maturity Models—Review and Classification. In Proceedings of the CBU International Conference Proceedings, Prague, Czech Republic, 20–22 March 2019; Volume 7, pp. 186–192. [Google Scholar]
- Dos Santos-Neto, J.B.S.; Costa, A.P.C.S. Enterprise Maturity Models: A Systematic Literature Review. Enterp. Inf. Syst. 2019, 13, 719–769. [Google Scholar] [CrossRef]
- Paulk, M.C.; Curtis, B.; Chrissis, M.B.; Weber, C.V. Capability Maturity Model, Version 1.1. IEEE Softw. 1993, 10, 18–27. [Google Scholar] [CrossRef]
- Tarhan, A.; Turetken, O.; Reijers, H.A. Business Process Maturity Models: A Systematic Literature Review. Inf. Softw. Technol. 2016, 75, 122–134. [Google Scholar] [CrossRef]
- Kalinowski, T.B. Business Process Maturity Models Research: A Systematic Literature Review. Int. J. Manag. Sci. Bus. Adm. 2020, 7, 29–35. [Google Scholar] [CrossRef]
- Farkaș, L.; Băroiu, A. Systematic Literature Review of Process Management Maturity and Management Processes Maturity. J. Softw. Syst. Dev. 2022, 2022, 435363. [Google Scholar] [CrossRef]
- Poeppelbuss, J.; Niehaves, B.; Simons, A.; Becker, J. Maturity Models in Information Systems Research: Literature Search and Analysis. Commun. Assoc. Inf. Syst. 2011, 29, 505–532. [Google Scholar] [CrossRef]
- Mettler, T.; Ballester, O. Maturity Models in Information Systems: A Review and Extension of Existing Guidelines. In Proceedings of the Forty-Second International Conference on Information Systems, Austin, TX, USA, 12–15 December 2021. [Google Scholar]
- Li, C.H.; Lau, H.K. A Critical Review of Maturity Models in Information Technology and Human Landscapes on Industry 4.0. In Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, VIC, Australia, 13–15 February 2019; pp. 1575–1579. [Google Scholar]
- Pereira, R.; Serrano, J. A Review of Methods Used on IT Maturity Models Development: A Systematic Literature Review and a Critical Analysis. J. Inf. Technol. 2020, 35, 161–178. [Google Scholar] [CrossRef]
- Silva, F.; Tammela, I.; Narcizo, R. A Systematic Literature Review on Industry 4.0 Maturity Models. In Proceedings of the Conference: XXVIII Simpósio de Engenharia de Produção, Bauru, Brazil, 10–12 November 2021. [Google Scholar]
- Hein-Pensel, F.; Winkler, H.; Brückner, A.; Wölke, M.; Jabs, I.; Mayan, I.J.; Kirschenbaum, A.; Friedrich, J.; Zinke-Wehlmann, C. Maturity Assessment for Industry 5.0: A Review of Existing Maturity Models. J. Manuf. Syst. 2023, 66, 200–210. [Google Scholar] [CrossRef]
- Barraza De La Paz, J.V.; Rodríguez-Picón, L.A.; Morales-Rocha, V.; Torres-Argüelles, S.V. A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0. Systems 2023, 11, 218. [Google Scholar] [CrossRef]
- Belghith, O.; Skhiri, S.; Zitoun, S.; Ferjaoui, S. A Survey of Maturity Models in Data Management. In Proceedings of the 2021 IEEE 12th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT), Cape Town, South Africa, 13–15 May 2021; pp. 298–309. [Google Scholar]
- Çaldağ, M.T.; Gökalp, E. The Maturity of Open Government Data Maturity: A Multivocal Literature Review. Aslib J. Inf. Manag. 2022, 74, 1007–1030. [Google Scholar] [CrossRef]
- Al-Sai, Z.A.; Husin, M.H.; Syed-Mohamad, S.M.; Abdullah, R.; Zitar, R.A.; Abualigah, L.; Gandomi, A.H. Big Data Maturity Assessment Models: A Systematic Literature Review. Big Data Cogn. Comput. 2023, 7, 2. [Google Scholar] [CrossRef]
- Meza-Ruiz, I.D.; Rocha-Lona, L.; del Rocío Soto-Flores, M.; Garza-Reyes, J.A.; Kumar, V.; Lopez-Torres, G.C. Measuring Business Sustainability Maturity-Levels and Best Practices. Procedia Manuf. 2017, 11, 751–759. [Google Scholar] [CrossRef]
- Vásquez, J.; Aguirre, S.; Puertas, E.; Bruno, G.; Priarone, P.C.; Settineri, L. A Sustainability Maturity Model for Micro, Small and Medium-Sized Enterprises (MSMEs) Based on a Data Analytics Evaluation Approach. J. Clean. Prod. 2021, 311, 127692. [Google Scholar] [CrossRef]
- Machado, M.C.; Carvalho, T.C. Maturity Models and Sustainable Indicators—A New Relationship. Sustainability 2021, 13, 13247. [Google Scholar] [CrossRef]
- Vargas-Florez, J.; Ruiz-Cantisani, M.I.; Castro-Zuluaga, C.; Marquez-Gutierrez, M. Small and Medium Enterprise-SMEs’ Resilience Model Based on Maturity Cycle. In Proceedings of the Eighteen LACCEI International Multi-Conference for Engineering, Education Caribbean Conference For Engineering And Technology, Virtual, 27–31 July 2020; Latin American and Caribbean Consortium of Engineering Institutions: Bogota, Colombia, 2020. [Google Scholar]
- Stocker, J.; Herda, N.; Wolf, M.; Ruf, S. A Maturity Model to Assess and Foster the Resilience of Organizations. Art Soc. 2022, 1, 1–12. [Google Scholar] [CrossRef]
- Carías, J.F.; Arrizabalaga, S.; Labaka, L.; Hernantes, J. Cyber Resilience Progression Model. Appl. Sci. 2020, 10, 7393. [Google Scholar] [CrossRef]
- Backlund, F.; Chronéer, D.; Sundqvist, E. Project Management Maturity Models—A Critical Review: A Case Study within Swedish Engineering and Construction Organizations. Procedia Soc. Behav. Sci. 2014, 119, 837–846. [Google Scholar] [CrossRef]
- Fabbro, E.; Tonchia, S. Project Management Maturity Models: Literature Review and New Developments. J. Mod. Proj. Manag. 2022, 8, 31–45. [Google Scholar] [CrossRef]
- Kljajić Borštnar, M.; Pucihar, A. Multi-Attribute Assessment of Digital Maturity of SMEs. Electronics 2021, 10, 885. [Google Scholar] [CrossRef]
- Pham Minh, H.; Pham Thi Thanh, H. Comprehensive Review of a Digital Maturity Model and Proposal for a Continuous Digital Transformation Process with Digital Maturity Model Integration. Sist. Gestão 2022, 17, 89–103. [Google Scholar] [CrossRef]
- Teichert, R. Digital Transformation Maturity: A Systematic Review of Literature. Acta Univ. Agric. Silvic. Mendel. Brun. 2019, 67, 1673–1687. [Google Scholar] [CrossRef]
- Sadiq, R.B.; Safie, N.; Abd Rahman, A.H.; Goudarzi, S. Artificial Intelligence Maturity Model: A Systematic Literature Review. PeerJ Comput. Sci. 2021, 7, e661. [Google Scholar] [CrossRef] [PubMed]
- Yang, Y.; Shi, Y.; Wang, T. Blockchain Technology Application Maturity Assessment Model for Digital Government Public Service Projects. Int. J. Crowd Sci. 2022, 6, 184–194. [Google Scholar] [CrossRef]
- Poeppelbuss, J.; Roeglinger, M. What Makes a Useful Maturity Model? A Framework of General Design Principles for Maturity Models and Its Demonstration in Business Process Management. In Proceedings of the 19th European Conference on Information Systems, ECIS 2011, Helsinki, Finland, 9–11 June 2011. [Google Scholar]
- Lasrado, L.A.; Vatrapu, R.; Andersen, K.N. Maturity Models Development in IS Research: A Literature Review. IRIS Sel. Pap. Inf. Syst. Res. Semin. Scand. 2015, 6, 6. [Google Scholar]
- Nikolaenko, V.; Sidorov, A. Assessment of Project Management Maturity Models Strengths and Weaknesses. J. Risk Financ. Manag. 2023, 16, 121. [Google Scholar] [CrossRef]
- Naskali, J.; Kaukola, J.; Matintupa, J.; Ahtosalo, H.; Jaakola, M.; Tuomisto, A. Mapping Business Transformation in Digital Landscape: A Prescriptive Maturity Model for Small Enterprises. In Proceedings of the 7th International Conference, WIS 2018; Turku, Finland, 27–29 August 2018, Proceedings; Springer: Cham, Switzerland, 2018; pp. 101–116. ISBN 978-3-319-97930-4. [Google Scholar]
- Reid, R.; Niekerk, J.V. From Information Security to Cyber Security Cultures. In Proceedings of the 2014 Information Security for South Africa, Johannesburg, South Africa, 13–14 August 2014; pp. 1–7. [Google Scholar]
- Taherdoost, H. Cybersecurity vs. Information Security. Procedia Comput. Sci. 2022, 215, 483–487. [Google Scholar] [CrossRef]
- von Solms, B.; von Solms, R. Cybersecurity and Information Security—What Goes Where? Inf. Comput. Secur. 2018, 26, 2–9. [Google Scholar] [CrossRef]
- De Bruin, R.; Solms, S.H. von Modelling Cyber Security Governance Maturity. In Proceedings of the 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 11–12 November 2015; pp. 1–8. [Google Scholar]
- Carcary, M.; Renaud, K.; McLaughlin, S.; O’Brien, C. A Framework for Information Security Governance and Management. IT Prof. 2016, 18, 22–30. [Google Scholar] [CrossRef]
- Prislan, K.; Mihelič, A.; Bernik, I. A Real-World Information Security Performance Assessment Using a Multidimensional Socio-Technical Approach. PLoS ONE 2020, 15, e0238739. [Google Scholar] [CrossRef] [PubMed]
- Aborujilah, A.; Al-Othmani, A.Z.; Hussien, N.S.; Mokhtar, S.A.; Long, Z.A.; Nizam, M. Cybersecurity Risk Assessment Approach for Malaysian Organizations: Malaysian Universities as Case Study. In Proceedings of the 2022 9th International Conference on Electrical and Electronics Engineering (ICEEE), Alanya, Turkey, 29–31 March 2022; pp. 440–450. [Google Scholar]
- Deshpande, V.M.; Desai, A. Smart Secure: A Novel Risk Based Maturity Model for Enterprise Risk Management during Global Pandemic. In Proceedings of the 2021 6th International Conference for Convergence in Technology (I2CT), Maharashtra, India, 2–4 April 2021; pp. 1–7. [Google Scholar]
- Loft, P.; He, Y.; Yevseyeva, I.; Wagner, I. CAESAR8: An Agile Enterprise Architecture Approach to Managing Information Security Risks. Comput. Secur. 2022, 122, 102877. [Google Scholar] [CrossRef]
- Bitzer, M.; Häckel, B.; Leuthe, D.; Ott, J.; Stahl, B.; Strobel, J. Managing the Inevitable—A Maturity Model to Establish Incident Response Management Capabilities. Comput. Secur. 2023, 125, 103050. [Google Scholar] [CrossRef]
- Schlette, D.; Vielberth, M.; Pernul, G. CTI-SOC2M2—The Quest for Mature, Intelligence-Driven Security Operations and Incident Response Capabilities: CTI-Driven SOC Capability Maturity Model. Comput. Secur. 2021, 111, 102482. [Google Scholar] [CrossRef]
- Jaquire, V.; von Solms, S. Developing a Cyber Counterintelligence Maturity Model for Developing Countries. In Proceedings of the 2017 IST-Africa Week Conference (IST-Africa), Windhoek, Namibia, 30 May–2 June 2017; pp. 1–8. [Google Scholar]
- Jeong, J.J.; Grobler, M.; Chamikara, M.A.P.; Rudolph, C. Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity. In Proceedings of the 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December 2019; pp. 330–337. [Google Scholar]
- Muronga, K.; Herselman, M.; Botha, A.; Veiga, A.D. An Analysis of Assessment Approaches and Maturity Scales Used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review. In Proceedings of the 2019 Conference on Next Generation Computing Applications (NextComp), Réduit, Mauritius, 19–21 September 2019; pp. 1–6. [Google Scholar]
- Drivas, G.; Chatzopoulou, A.; Maglaras, L.; Lambrinoudakis, C.; Cook, A.; Janicke, H. A NIS Directive Compliant Cybersecurity Maturity Assessment Framework. In Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 13–17 July 2020; pp. 1641–1646. [Google Scholar]
- Oliveira, A.d.S.; Santos, H. Continuous Industrial Sector Cybersecurity Assessment Paradigm: Proposed Model of Cybersecurity Certification. In Proceedings of the 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltrú, Spain, 28–31 March 2022; pp. 1–6. [Google Scholar]
- Yulianto, S.; Lim, C.; Soewito, B. Information Security Maturity Model: A Best Practice Driven Approach to PCI DSS Compliance. In Proceedings of the 2016 IEEE Region 10 Symposium (TENSYMP), Bali, Indonesia, 9–11 May 2016; pp. 65–70. [Google Scholar]
- Sen, N.; Atilla, D.C.; Karan, O. Decision Support System for Operational, Financial, Performance and Risk Indicators of Maturity Models over Cloud-Based Software. In Proceedings of the 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, 27–28 October 2021; pp. 1–6. [Google Scholar]
- Zhou, X.; Weng, H. Assessing Information Security Performance of Enterprise Internal Financial Sharing in Cloud Computing Environment Using Analytic Hierarchy Process. Int. J. Grid Util. Comput. 2022, 13, 256–271. [Google Scholar] [CrossRef]
- Miloslavskaya, N.; Tolstaya, S. Information Security Management Maturity Models. Procedia Comput. Sci. 2022, 213, 49–57. [Google Scholar] [CrossRef]
- Rea-Guaman, A.M.; San Feliu, T.; Calvo-Manzano, J.A.; Sanchez-Garcia, I.D. Comparative Study of Cybersecurity Capability Maturity Models BT—Software Process Improvement and Capability Determination; Mas, A., Mesquida, A., O’Connor, R.V., Rout, T., Dorling, A., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 100–113. [Google Scholar]
- Garba, A.A.; Siraj, M.M.; Othman, S.H. An Explanatory Review on Cybersecurity Capability Maturity Models. Adv. Sci. Technol. Eng. Syst. J. 2020, 5, 762–769. [Google Scholar] [CrossRef]
- Garba, A.A.; Musa Bade, A.; Yahuza, M.; Nuhu, Y. Cybersecurity Capability Maturity Models Review and Application Domain. Int. J. Eng. Technol. 2020, 9, 79–784. [Google Scholar] [CrossRef]
- Rabii, A.; Assoul, S.; Ouazzani Touhami, K.; Roudies, O. Information and Cyber Security Maturity Models: A Systematic Literature Review. Inf. Comput. Secur. 2020, 28, 627–644. [Google Scholar] [CrossRef]
- ISO/IEC Standard No. 27001:2022; ISO/IEC Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. ISO: Geneva, Switzerland, 2022.
- ISO/IEC Standard No. 27002:2022; ISO/IEC Information Security, Cybersecurity and Privacy Protection—Information Security Controls. ISO: Geneva, Switzerland, 2022.
- ISO/IEC Standard No. 21827:2008; ISO/IEC Information Technology—Security Techniques—Systems Security Engineering—Capability Maturity Model® (SSE-CMM®). ISO: Geneva, Switzerland, 2022.
- Fink, A. Conducting Research Literature Reviews: From the Internet to Paper, 5th ed.; SAGE Publications: Thousand Oaks, CA, USA, 2019; ISBN 978-1-5443-1845-5. [Google Scholar]
- Kitchenham, B.; Brereton, P. A Systematic Review of Systematic Review Process Research in Software Engineering. Inf. Softw. Technol. 2013, 55, 2049–2075. [Google Scholar] [CrossRef]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering, Technical Report EBSE 2007-001; Keele University: Newcastle, UK; Durham University: Durham, UK, 2007. [Google Scholar]
- Bajaj, A.; Sangwan, O.P. A Systematic Literature Review of Test Case Prioritization Using Genetic Algorithms. IEEE Access 2019, 7, 126355–126375. [Google Scholar] [CrossRef]
- Cantu, J.; Tolk, J.; Fritts, S.; Gharehyakheh, A. High Reliability Organization (HRO) Systematic Literature Review: Discovery of Culture as a Foundational Hallmark. J. Conting. Crisis Manag. 2020, 28, 399–410. [Google Scholar] [CrossRef]
- Heiding, F.; Katsikeas, S.; Lagerström, R. Research Communities in Cyber Security Vulnerability Assessments: A Comprehensive Literature Review. Comput. Sci. Rev. 2023, 48, 100551. [Google Scholar] [CrossRef]
- Katsikeas, S.; Johnson, P.; Ekstedt, M.; Lagerström, R. Research Communities in Cyber Security: A Comprehensive Literature Review. Comput. Sci. Rev. 2021, 42, 100431. [Google Scholar] [CrossRef]
- Shukla, A.; Katt, B.; Nweke, L.O.; Yeng, P.K.; Weldehawaryat, G.K. System Security Assurance: A Systematic Literature Review. Comput. Sci. Rev. 2022, 45, 100496. [Google Scholar] [CrossRef]
- Onyemelukwe, I.C.; Ferreira, J.A.V.; Ramos, A.L. Human Energy Management in Industry: A Systematic Review of Organizational Strategies to Reinforce Workforce Energy. Sustainability 2023, 15, 13202. [Google Scholar] [CrossRef]
- Siksnelyte-Butkiene, I.; Streimikiene, D.; Balezentis, T.; Skulskis, V. A Systematic Literature Review of Multi-Criteria Decision-Making Methods for Sustainable Selection of Insulation Materials in Buildings. Sustainability 2021, 13, 737. [Google Scholar] [CrossRef]
- ISO/IEC Standard No. 27005:2022; ISO/IEC Information Security, Cybersecurity and Privacy Protection—Guidance on Managing Information Security Risks. ISO: Geneva, Switzerland, 2022.
- NIST Special Publication 800-30; Guide for Conducting Risk Assessments. National Institute of Standards and Technology: Gaithersburg, MA, USA, 2012.
- Clarivate. Clarivate. Clarivate Journal Citation Reports. In First Time Journal Citation Reports Inclusion List 2023; Clarivate: Philadelphia, PA, USA, 2023. [Google Scholar]
- Barnes, B.; Daim, T. Information Security Maturity Model for Healthcare Organizations in the United States. IEEE Trans. Eng. Manag. 2022, 71, 1–12. [Google Scholar] [CrossRef]
- Aliyu, A.; Maglaras, L.; He, Y.; Yevseyeva, I.; Boiten, E.; Cook, A.; Janicke, H. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Appl. Sci. 2020, 10, 3660. [Google Scholar] [CrossRef]
- Yigit Ozkan, B.; Spruit, M.; Wondolleck, R.; Burriel Coll, V. Modelling Adaptive Information Security for SMEs in a Cluster. J. Intellect. Cap. 2020, 21, 235–256. [Google Scholar] [CrossRef]
- Mijnhardt, F.; Baars, T.; Spruit, M. Organizational Characteristics Influencing SME Information Security Maturity. J. Comput. Inf. Syst. 2016, 56, 106–115. [Google Scholar] [CrossRef]
- Cholez, H.; Girard, F. Maturity Assessment and Process Improvement for Information Security Management in Small and Medium Enterprises. J. Softw. Evol. Process 2014, 26, 496–503. [Google Scholar] [CrossRef]
- You, Y.; Oh, J.; Kim, S.; Lee, K. Advanced Approach to Information Security Management System Utilizing Maturity Models in Critical Infrastructure. KSII Trans. Internet Inf. Syst. 2018, 12, 4995–5014. [Google Scholar] [CrossRef]
- Karabacak, B.; Yildirim, S.O.; Baykal, N. A Vulnerability-Driven Cyber Security Maturity Model for Measuring National Critical Infrastructure Protection Preparedness. Int. J. Crit. Infrastruct. Prot. 2016, 15, 47–59. [Google Scholar] [CrossRef]
- Mukherjee, P.; Mazumdar, C. “Security Concern” as a Metric for Enterprise Business Processes. IEEE Syst. J. 2019, 13, 4015–4026. [Google Scholar] [CrossRef]
- Mbanaso, U.M.; Abrahams, L.; Apene, O.Z. Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework. Afr. J. Inf. Commun. 2019, 23, 1–26. [Google Scholar]
- Kour, R.; Karim, R.; Thaduri, A. Cybersecurity for Railways—A Maturity Model. Proc. Inst. Mech. Eng. Part F J. Rail Rapid Transit 2020, 234, 1129–1148. [Google Scholar] [CrossRef]
- Gourisetti, S.N.G.; Mylrea, M.; Patangia, H. Cybersecurity Vulnerability Mitigation Framework through Empirical Paradigm: Enhanced Prioritized Gap Analysis. Future Gener. Comput. Syst. 2020, 105, 410–431. [Google Scholar] [CrossRef]
- Benz, M.; Chatterjee, D. Calculated Risk? A Cybersecurity Evaluation Tool for SMEs. Bus. Horiz. 2020, 63, 531–540. [Google Scholar] [CrossRef]
- Gourisetti, S.N.G.; Mylrea, M.; Patangia, H. Cybersecurity Vulnerability Mitigation Framework Through Empirical Paradigm (CyFEr): Prioritized Gap Analysis. IEEE Syst. J. 2020, 14, 1897–1908. [Google Scholar] [CrossRef]
- Schmitz, C.; Pape, S. LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security. Comput. Secur. 2020, 90, 101656. [Google Scholar] [CrossRef]
- Englbrecht, L.; Meier, S.; Pernul, G. Towards a Capability Maturity Model for Digital Forensic Readiness. Wirel. Netw. 2020, 26, 4895–4907. [Google Scholar] [CrossRef]
- Dube, D.P.; Mohanty, R.P. Towards Development of a Cyber Security Capability Maturity Model. Int. J. Bus. Inf. Syst. 2020, 34, 104–127. [Google Scholar] [CrossRef]
- Al-Matari, O.M.M.; Helal, I.M.A.; Mazen, S.A.; Elhennawy, S. Adopting Security Maturity Model to the Organizations’ Capability Model. Egypt. Inform. J. 2021, 22, 193–199. [Google Scholar] [CrossRef]
- Almomani, I.; Ahmed, M.; Maglaras, L. Cybersecurity Maturity Assessment Framework for Higher Education Institutions in Saudi Arabia. PeerJ Comput. Sci. 2021, 7, e703. [Google Scholar] [CrossRef]
- Shaked, A.; Tabansky, L.; Reich, Y. Incorporating Systems Thinking into a Cyber Resilience Maturity Model. IEEE Eng. Manag. Rev. 2021, 49, 110–115. [Google Scholar] [CrossRef]
- Dornheim, P.; Zarnekow, R. Determining Cybersecurity Culture Maturity and Deriving Verifiable Improvement Measures. Inf. Comput. Secur. 2024, 32, 179–196. [Google Scholar] [CrossRef]
- Pigola, A.; Rezende Da Costa, P. Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats. Commun. Assoc. Inf. Syst. 2023, 53, 1099–1135. [Google Scholar] [CrossRef]
- Grigaliūnas, Š.; Schmidt, M.; Brūzgienė, R.; Smyrli, P.; Bidikov, V. Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks. Future Internet 2023, 15, 330. [Google Scholar] [CrossRef]
- Shaheen, K.; Zolait, A.H. The Impacts of the Cyber-Trust Program on the Cybersecurity Maturity of Government Entities in the Kingdom of Bahrain. Inf. Comput. Secur. 2023, 31, 529–544. [Google Scholar] [CrossRef]
- Yeoh, W.; Liu, M.; Shore, M.; Jiang, F. Zero Trust Cybersecurity: Critical Success Factors and A Maturity Assessment Framework. Comput. Secur. 2023, 133, 103412. [Google Scholar] [CrossRef]
- Kern, M.; Landauer, M.; Skopik, F.; Weippl, E. A Logging Maturity and Decision Model for the Selection of Intrusion Detection Cyber Security Solutions. Comput. Secur. 2024, 141, 103844. [Google Scholar] [CrossRef]
- Seeba, M.; Affia, A.O.; Mäses, S.; Matulevičius, R. Create Your Own MUSE: A Method for Updating Security Level Evaluation Instruments. Comput. Stand. Interfaces 2024, 87, 103776. [Google Scholar] [CrossRef]
- Mohamad, M.; Steghöfer, J.-P.; Knauss, E.; Scandariato, R. Managing Security Evidence in Safety-Critical Organizations. J. Syst. Softw. 2024, 214, 112082. [Google Scholar] [CrossRef]
- Khanna, K.; Govindarasu, M. Resiliency-Driven Cyber–Physical Risk Assessment and Investment Planning for Power Substations. IEEE Trans. Control Syst. Technol. 2024, 32, 1743–1754. [Google Scholar] [CrossRef]
- Dinkova, M.; El-Dardiry, R.; Overvest, B. Should Firms Invest More in Cybersecurity? Small Bus. Econ. 2024, 63, 21–50. [Google Scholar] [CrossRef]
Time Span | 2012–2024 |
---|---|
Source selection | The following databases will be included:
|
Search strategy |
|
Selection process |
|
Topic | Description | Keywords |
---|---|---|
Maturity | Keywords that address maturity- related concepts |
|
Information security | Keywords that address information security-related concepts |
|
Cyber security | Keywords that address cyber security-related concepts |
|
Included | Excluded |
---|---|
Year of publication between 2012 and 2024 | Year of publication outside the range 2012–2024 |
Found in the selected databases | Duplicated studies |
Publication type “research article” or “conference paper” | Publications of other types |
Published in English | Publication language other than English |
Focus on the domain «information security maturity» or «cyber security maturity» | Outside the domains «information security maturity» and «cyber security maturity» |
Studies with the following scopes (at least one):
| Studies outside these scopes |
Full text available for qualitative analysis | Full text not available |
Source | Query | No. of Results |
---|---|---|
IEEE Xplore | ((((“Abstract”:“maturity”) AND (“Abstract”:“model” OR “Abstract”:“framework” OR “Abstract”:“assessment” OR “Abstract”:“evaluation” OR “Abstract”:“level”)) AND (“Abstract”:“information security” OR “Abstract”:“INFOSEC” OR “Abstract”:“information system security” OR “Abstract”:“IT security” OR “Abstract”:“IS security” OR “Abstract”:“cyber security” OR “Abstract”:“cybersecurity”))) Filters Applied: Conferences, Journals, 2012–2024 | 126 |
ACM Digital Library | [Abstract: “maturity”] AND [[Abstract: “model”] OR [Abstract: “assessment”] OR [Abstract: “evaluation”] OR [Abstract: “level”]] AND [[Abstract: “information security”] OR [Abstract: “infosec”] OR [Abstract: “information system security”] OR [Abstract: “it security”] OR [Abstract: “is security”] OR [Abstract: “cyber security”] OR [Abstract: “cybersecurity”]] AND [E-Publication Date: (1 January 2012 TO 31 July 2024)] Filters Applied: Research Article | 37 |
Web of Science | (AB=(((“maturity”) AND (“model” OR “framework” OR “assessment” OR “evaluation” OR “level”)) AND (“information security” OR “infosec” OR “information system security” OR “IT security” OR “IS security” OR “cyber security” OR “cybersecurity”))) AND (DT==(“ARTICLE” OR “REVIEW”) AND DT==(“ARTICLE” OR “REVIEW”) AND LA==(“ENGLISH”) AND TASCA==(“COMPUTER SCIENCE INFORMATION SYSTEMS” OR “MANAGEMENT” OR “BUSINESS” OR “COMPUTER SCIENCE SOFTWARE ENGINEERING” OR “TELECOMMUNICATIONS” OR “ENGINEERING ELECTRICAL ELECTRONIC”)) Refined By: Document Types: Article or Review Article + Languages: English + Publication Years: 2012–2024 | 69 |
Science Direct | “maturity” AND (“model” OR “assessment” OR “evaluation” OR “level”) AND (“information security” OR “cyber security” OR “cybersecurity”) Custom range 2012–2024 Filters Applied: Review article + Research Article | 49 |
Total | 281 |
Sector | No. of Studies | % of Studies |
---|---|---|
Organisations in General | 30 | 31.25 |
Utilities | 13 | 13.54 |
Information Technology | 9 | 9.38 |
Government | 8 | 8 |
Financial Services | 7 | 7.29 |
SME Sector | 7 | 7.29 |
Healthcare | 5 | 5.21 |
Education | 4 | 4 |
Public Sector | 3 | 3.13 |
Transportation | 3 | 3.13 |
Manufacturing | 2 | 2.08 |
n/a | 5 | 5.21 |
Total | 96 | 100 |
Group of Studies | ID | |
---|---|---|
Group 1 | Development of new maturity concept | RA3, RA4, RA6, RA9, RA12, RA13, RA14, RA15, RA16, R18, RA19, RA25, RA26, RA28, RA31, RA32 |
Group 2 | Implementation of already known maturity concept | RA2, RA7, RA8, RA10, RA11, RA20, RA21, RA27, RA30 |
Group 3 | Other | RA1, RA5, RA17, RA22, RA23, RA24, RA29, RA33, RA34, RA35, RA36 |
ID | Title/Name of the New Maturity Concept | Is the New Concept Based on Already Known Maturity Concept? | Is Validation or Testing of the New Concept Provided? |
---|---|---|---|
RA3 | Vulnerability-Driven Cybersecurity Maturity Model | No. | Yes, validated with critical infrastructure preparedness data. |
RA4 | Advanced Information Security Maturity Assessment (AISMA) | Yes. CMMI. | Yes. Validation provided through simulation in critical infrastructure (thermal power plants). |
RA6 | Cybersecurity Resilience Maturity Measurement (CRMM) | Yes. CRMM adapts and integrates elements from several well-established frameworks, including NIST CSF, COBIT 5, CIS Controls, SoGP for IS, and ISO/IEC 27005 [93]. | Partly. The model has been partially validated through expert consultations, but lacks full practical implementation. |
RA9 | Holistic Cybersecurity Maturity Assessment Framework (HCYMAF) for Higher Education Institutions in the United Kingdom | Yes. CMM. | Yes. Validation through case study in education UK institutions. |
RA12 | Cybersecurity Vulnerability Mitigation Framework Through Empirical Paradigm (CyFEr) | Yes. NIST CSF. | Yes. Validation is provided through a real-world cyberattack demonstration. |
RA13 | LiSRA (Lightweight Security Risk Assessment) | Not directly but it incorporates general principles from ISO/IEC 27001 [80] or NIST SP 800-30 [94]. | Partly. The model has been validated through case studies but lacks broader practical testing. |
RA14 | Method for Adaptive Information Security Maturity Modelling in Clusters (MAISMMC) | Yes. Information Security Focus Area Maturity Model (ISFAM). | Partly. The model has been validated through case studies but lacks broader practical testing. |
RA15 | Digital Forensic Readiness Capability Maturity Model | Yes. CMMI and Software Process Improvement and Capability Determination (SPICE). | Partly. The application of the model is tested through a case study based on publicly available information about the Target Corporation data breach. |
RA16 | Cyber Security Capability Maturity Model (CSCMM) | No. | Yes, validation of the model is based on an empirical study and view from almost 200 cross-sector cyber security experts. |
RA18 | Cyber Threat Intelligence-driven SOC Maturity Mode (CTI-SOC2M2) | Yes. CMMI. | Yes, tested in SOC environments. |
RA19 | Cybersecurity Maturity Assessment Framework (SCMAF) for Higher Education Institutions in Saudi Arabia | Yes. HCYMAF. | Yes. Validated through case studies in higher education institutions in Saudi Arabia. |
RA25 | Information Security Maturity Model for Healthcare Organisations in the United States | No. | Yes, validated through use cases in healthcare organisations. |
RA26 | Incident Response Management Maturity Model (IRM3) | No. | Partly. Tested through simulations of incident response scenarios. |
RA28 | Dynamic Capabilities in Cybersecurity Intelligence (DCCI) Framework | No. | Partly. Based on a meta-synthesis of 47 case studies, but direct empirical testing is not provided. |
RA31 | Zero Trust Cybersecurity Maturity Assessment Framework | Yes. NIST Zero Trust Architecture. | Party. The model was designed and validated by cyber security experts from various industries, but the study does not describe practical validation in real organisations. |
RA32 | Logging Maturity and Decision Model | No. | Yes. Validated using MITRE ATT&CK data and illustrative case studies. |
ID | Maturity Concept Used | Short Description |
---|---|---|
RA2 | IT Capability Maturity Framework (IT-CMF) | Implements IT-CMF for assessing and improving IT capabilities, with a focus on security governance. |
RA7 | Cybersecurity Capability Maturity Model (C2M2) | Adapts the C2M2 in the railway sector, focussing on improving cyber security preparedness and resilience. |
RA8 | NIST CSF | Uses NIST CSF to prioritise and mitigate vulnerabilities through empirical gap analysis. |
RA10 | Socio-technical maturity models, CMMI, Information Security Governance Frameworks | Applies socio-technical and governance frameworks for assessing information security performance. |
RA11 | NIST CSF | Proposes a cyber security evaluation tool for SMEs, based on the five NIST CSF categories, to help assess and improve their cyber security maturity. |
RA20 | Promoting Global Cyber Resilience for Sectors and Society (ProGReSS) | Integrates systems thinking to enhance resilience maturity. |
RA21 | COBIT | A case study is conducted where practitioners assessed a subset of the ISO/IEC 27002 security controls for a hypothetical scenario using the COBIT 5 maturity levels. |
RA27 | Information Protection Culture Assessment (IPCA) assessment framework | Shows how IPCA can be applied to measure and improve the cyber security culture within an organisation through tailored surveys and actionable improvement measures. |
RA30 | Bahrain Government framework Cyber Trust Program (CTP) | Uses the CTP to assess and improve cyber security maturity in government entities in Bahrain. |
ID | Short Description | Relation to Information/Cyber Security Maturity |
---|---|---|
RA1 | Explores maturity assessment for information security management in SMEs. | Provides a methodology for SMEs to assess and improve their information security maturity. |
RA5 | Introduces a metric-based approach for evaluating security concerns in business processes. | Provides metrics to evaluate and improve maturity in business processes. |
RA17 | Adapts security maturity model to align with organisational capabilities. | Suggests a way to align organisational capabilities with security maturity models, contributing to the understanding of maturity adaptation to different organisational contexts. |
RA22 | Proposes an agile architecture approach for managing information security risks. | Introduces agile approaches to information security risk management and provides an indirect framework for understanding risk-related aspects of security maturity. |
RA23 | Conducts a systematic literature review on cyber security maturity models for startups. | Reviews existing cyber security maturity models and provides insights into gaps and needs to support the development of future maturity models. Summarises existing models and frameworks to improve startup maturity. |
RA29 | Utilises taxonomic engineering for security baseline compliance in regulatory frameworks. | Focusses on compliance and provides a framework that indirectly measures maturity through adherence to security standards. |
RA33 | Proposes a method for updating security-level evaluation instruments. | Proposes improvements to evaluation instruments, contributing to the continuous development and understanding of security maturity. |
RA34 | Explores managing security evidence in safety-critical organisations. | Discusses the management of security evidence that indirectly contributes to maturity through operational effectiveness and security management. |
RA35 | Assesses cyber-physical risk and investment planning for power substations. | Examines risk and investment strategies for resilience and provides a context for understanding how cyber-physical systems affect maturity. |
RA36 | Analyses cyber security investment and maturity among Dutch firms. | Analyses whether higher investment in cyber security correlates with a higher level of maturity and thus contributes to understanding the readiness and maturity of organisations. |
Sector/Industry | Type of Organisation | Related Articles | Description of ICS MM Application |
---|---|---|---|
Critical infrastructure | Railways, Energy, Utilities, Cyber-physical systems | RA3, RA4, RA7, RA35 | Focusses on improving preparedness and resilience in critical infrastructure through models like C2M2 and vulnerability-driven models. |
Government institutions | Government agencies, Public sector organisations | RA18, RA20, RA30 | Government agencies have adopted models like the Cyber Trust Program and CTI-SOC2M2 for information/cyber security maturity and threat intelligence. |
Healthcare | Hospitals, Healthcare providers | RA25, RA26 | Healthcare Information Security Maturity Model helps ensure compliance with regulations and improves sensitive patient data security. |
Higher education | Universities, Colleges | RA9, RA19 | Higher education institutions use customised maturity frameworks to address the specific information/cyber security challenges in academia and research. |
Small and Medium-sized Enterprises (SMEs) | Private sector, SMEs | RA1, RA11, RA13, RA14, RA16 | Maturity models and evaluation tools tailored for SMEs help improve security readiness with limited resources. |
Technology startups | Startups and emerging tech companies | RA23 | Maturity models help startups align cyber security practices with business growth and scalability. |
Digital forensics | Law enforcement, Cyber security teams | RA15 | The Digital Forensic Readiness Capability Maturity Model focusses on improving forensic readiness in organisations that need to handle digital evidence effectively. |
Financial services | Financial institutions | RA36 | Focusses on analysing cyber security investments and improving maturity in banking and financial firms. |
Driver | Sector/Industry | Related Articles | Description |
---|---|---|---|
Regulatory compliance | Healthcare, Government, Public sector, Critical infrastructure | RA18, RA25, RA30, RA35 | ICS MMs ensure compliance with laws (such as Health Insurance Portability and Accountability Act (HIPAA) in healthcare) and regulations in critical infrastructure sectors. Government agencies implement ICS MMs to align with international standards and improve compliance (e.g., the Cyber Trust Program). |
Cyber security threat resilience | Critical infrastructure, Energy, Railways | RA3, RA4, RA7, RA18, RA35 | ICS MMs help to increase the resilience of critical infrastructure and the energy sector to cyber security threats. |
Data protection | Healthcare, Higher education | RA9, RA19, RA25 | The protection of sensitive data (e.g., patient or research data) is a key driver in adopting ICS MMs in healthcare and academic institutions. |
Risk management and mitigation | SMEs, Financial services, Technology startups | RA11, RA12, RA13, RA23, RA36 | Managing and mitigating cyber security risks is critical for SMEs and financial institutions, especially for the protection of assets with limited resources. |
Incident response preparedness | Government, Critical infrastructure | RA18, RA20, RA26 | Incident response maturity helps organisations, especially in critical infrastructures, to manage security incidents effectively. |
Investment in cyber security | Financial services, Startups, Large enterprises | RA23, RA36 | ICS MMs support organisations in prioritising information/cyber security investments and aligning them with the company’s growth objectives. |
Enhancing security culture | Government, Public institutions, SMEs | RA9, RA18, RA27 | Promote a security-conscious culture through maturity models, especially in government organisations and SMEs where cultural awareness is crucial. |
Improving business continuity | Critical infrastructure, Railways | RA3, RA7, RA26, RA35 | Ensuring business continuity by improving maturity in sectors such as rail transport and electricity supply that rely on uninterrupted operations. |
Cost-effective security solutions | SMEs | RA11, RA13, RA16 | Maturity models such as LiSRA help SMEs to introduce cost-effective security solutions that are tailored to their limited resources. |
Gap/Limitation | Description | Related Articles |
---|---|---|
Resource constraints | SMEs often lack the resources (time, money, personnel) to effectively implement ICS MMs, which are usually designed for larger organisations. | RA1, RA11, RA13, RA14, RA16 |
Complexity of models | Some ICS MMs are considered too complex and difficult to understand and implement, especially in organisations with limited cyber security expertise. | RA11, RA12, RA16, RA30 |
Customisation to specific sectors | A lack of sector-specific customisation in many models, leading to difficulties in implementation for sectors with specific requirements (e.g., healthcare, higher education). | RA7, RA9, RA16, RA19, RA25 |
Lack of practical guidance | While many models offer assessments, they lack detailed, actionable guidance on how to implement the improvements needed to increase maturity. | RA12, RA25, RA26 |
Cultural and human factor barriers | Resistance to change, lack of cyber security awareness and an inadequate security culture are barriers to successful ICS MM implementation in some organisations. | RA18, RA27 |
Alignment with business objectives | Difficulties in aligning cyber security maturity models with broader business objectives, leading to a mismatch between security and strategic goals. | RA13, RA36 |
Lack of automation and tool support | Limited integration of automation tools in ICS MMs, making the process of tracking, managing, and improving maturity tedious and resource intensive. | RA11, RA31 |
Inconsistent metrics and evaluation | The lack of standardised metrics and evaluation methods for the various models makes it difficult for organisations to measure progress or compare it with industry standards. | RA21, RA24 |
Integration with existing systems | Challenges in integrating ICS MMs into existing organisational processes (e.g., risk management systems, incident response) and adapting them to existing structures. | RA10, RA20, RA26 |
Financial barriers | High implementation costs are a common constraint, especially in resource-limited organisations that cannot afford the full range of tools and expertise required for ICS MMs. | RA13, RA36 |
Limited focus on emerging technologies | Some models do not adequately account for emerging technologies and modern threats (e.g., cloud computing, AI), making them less relevant to today’s rapidly evolving cyber security landscape. | RA28, RA32 |
Time-consuming assessments | The time required to assess and reassess information/cyber security maturity is often considered too high, especially for organisations that need a quick assessment. | RA11, RA30 |
Opportunity/Future Direction | Description | Related Articles |
---|---|---|
Empirical validation of models | The need to test existing conceptual models more empirically in different sectors and validate them in practice. | RA6, RA9, RA12, RA15, RA16, RA19 |
Sector-specific customisation | Development and refinement of models that meet the specific needs of different industries and sectors (e.g., healthcare, education, SMEs). | RA7, RA9, RA13, RA16, RA19, RA25 |
Integration with emerging technologies | Research on how maturity models can adapt to new technologies and threats such as cloud computing and AI-driven attacks. | RA28, RA32 |
Automation and tool support | The opportunity to improve maturity models through automation and better tools for managing assessments and tracking improvements. | RA11, RA31 |
Simplified models for SMEs | Development of lightweight and cost-effective models tailored to the specific challenges of SMEs. | RA1, RA11, RA13, RA14 |
Cross-organisational comparisons | Creation of standardised metrics and frameworks to enable cross-organisational comparisons of cyber security maturity. | RA21, RA24 |
Integration with risk management | Expanding models to more fully integrate risk management practices to help organisations better align security with risk mitigation efforts. | RA10, RA20, RA26 |
Alignment with business goals | Future research could focus on better aligning maturity models with strategic business objectives, especially for SMEs and startups. | RA13, RA36 |
Focus on incident response maturity | Opportunities to refine models that focus specifically on incident response capabilities to ensure rapid recovery from cyber attacks. | RA12, RA18, RA26 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Brezavšček, A.; Baggia, A. Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review. Systems 2025, 13, 52. https://doi.org/10.3390/systems13010052
Brezavšček A, Baggia A. Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review. Systems. 2025; 13(1):52. https://doi.org/10.3390/systems13010052
Chicago/Turabian StyleBrezavšček, Alenka, and Alenka Baggia. 2025. "Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review" Systems 13, no. 1: 52. https://doi.org/10.3390/systems13010052
APA StyleBrezavšček, A., & Baggia, A. (2025). Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review. Systems, 13(1), 52. https://doi.org/10.3390/systems13010052