Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 7

SANS SECURITY AWARENESS MATURITY MODEL INDICATORS - Last Updated 2 March, 2022

Maturity Level Description Program Indicators People Indicators Time to Achieve Metrics Steps to Next Level
Program does not exist. Employees have no idea that they are a * There is no security awareness program * Employees never discuss security or exhibit secure behaviors NA None * Identify the regulations or standards that you must adhere to
target, that their actions have a direct impact on the security of the * Leadership does not discuss or care about security awareness * Identify security awareness requirements for those standards
organization, do not know or follow organization policies, and easily * Identify someone to roll out the required security awareness training
fall victim to attacks. * Develop or purchase training that meets those requirements
* Deploy security awareness training
STAGE 01: No Security VALUE: None. Your organization is at high risk of failing to meet any * Track and document who completes the training
Awareness Program compliance requirements and highly vulnerable to human-driven
incidents.

Program is designed primarily to meet specific compliance or audit * There is no strategic plan, training topics are ad hoc and deployed * People have a "Let's get this over with" attitude Depends on the standards, regulations, * Number / % of people that have completed training * Identify and gain support of stakeholders
requirements. Training is limited to annual or ad hoc basis. at random times. * People feel security is something that IT takes care of - it's not their or legal requirements you are * Number / % of people that have signed Acceptable Use Policy * Create Project Charter, identifying things such as scope, goals, objectives,
Employees are unsure of organizational policies and/or their role in * Program has limited leadership support. Leadership's goal is to problem attempting to adhere to. However the * Number of on-site training sessions in one year assumptions, and constraints
protecting their organization’s information assets. maintain compliance at minimum costs. * People feel security is something they have to do overall effort is usually minimal, * Number / frequency of awareness materials distributed * Identify who will be responsible for the awareness program. To ensure
* Security awareness is only considered during audits. * People have a negative perception of security and / or the security requiring nothing more than annual (newsletters, posters, etc.) greatest success, that person should be dedicated full time, have soft skills,
VALUE: Your security awareness program meets the legal * Program lead is a part-time job for one single person, often team training. and report to and be a part of the security team.
requirements your organization is required to adhere to. However someone reporting to the compliance, audit, or governance teams * Create Advisory Board
your organization is not effectively managing its human risk. * There is little coordination or partnership with other departments, * Identify the top human risks you will need to manage. Coordinate with your
such as Communications and Human Resources. Incident Response team, Security Operations Center, and / or Cyber Threat
STAGE 02: Compliance * Leadership perceives security is purely a technical issue. Intelligence team to help you with this. This may also require some type of
Focused * Training is primarily once a year human risk assessment
* There is little to no communication to the workforce about security * Identify the key behaviors that will mitigate and manage your top risks
beyond the annual training * Plan how you will communicate to, engage, and train your workforce on these
key behaviors
* Develop and / or purchase your training materials
* Create execution plan with milestones to include metrics
* Have senior leadership announce program then launch

Program identifies the target groups and training topics that have the * Leadership understands and commits to the need for managing * Employees understand that security technology alone cannot protect Depending on the behaviors you are * Phishing simulation click and report rates * Establish a process to give leadership regular updates on the awareness
greatest impact in managing human risk and ultimately supporting human risk them and they have a responsibility to protect themselves and the attempting to change, you can begin * Number of infected computers/devices each month program
the organization’s mission. Program goes beyond just annual training * There is a strategic plan that has identified the scope of the project, organization's assets impacting behaviors organization wide * Number of lost or stolen computers/devices each month * Identify new or changing technologies, threats, business requirements, or
and includes continual reinforcement throughout the year. Content is goals, objectives, and justification for the program * People are reporting incidents or suspected attacks within 3-6 months. For example, you * Adoption rate of Password Managers or MFA standards that should be included in annual update
communicated in an engaging and positive manner that encourages * Security team has identified and can explain their top human risks * When security team pushes out information, people are asking them can begin to see a dramatic drop in * Percentage of mobile devices that are updated and / or * Conduct surveys and assessments to determine current state of awareness
behavior change. As a result, people understand and follow and the behaviors that most effectively manage those risks questions phishing click rates organization wide if screenlocks enabled and associated behaviors
organization policies and actively recognize, prevent, and report * Program has sufficient leadership support to provide resources * Employees are exhibiting the behaviors they are being trained on you do extensive phishing training and * Number of accidental data loss events * Schedule a specific date when the security program is reviewed every year
incidents. necessary and has an executive champion * Employees bring strong security behaviors home simulations. * NOTE: See the interactive metrics matrix for more examples. and updated by the Advisory Board
* Security awareness is considered a part of the organization's These metrics are ultimately driven by what behaviors are the * Expand modalities to scale and engage workforce. Examples include
VALUE: Your organization is not only meeting its compliance overall security effort However, the more behaviors you are most important to managing your human risk. ambassador program, gamification, and OSINT briefs for senior executives
requirements but is able to effectively manage and measure its * Program lead is dedicated full time to the effort, has strong attempting to change, the longer it can * Build outreach, communication and engagement efforts into as many security
human risk. communication skills, and is a part of the security team take to change those behaviors initiatives as possible.
STAGE 03: Promoting * Program coordinates and collaborates with various departments organization side. This is one of the
Awareness and Behavior within organization, including Communications, Human Resources, reasons it is so important to prioritize
Change and Help Desk. Often this coordination is done through an Advisory your top human risks, and the
Board. behaviors that manage those risks.
* Program has gone beyond just annual training and includes The fewer behaviors you focus on the
continuous reinforcement throughout the year. Usually also includes more likely you can change those
a phishing program behaviors.
* Program works to positively engage the workforce

Program has the processes, resources, and leadership support in * Program is actively reviewed and updated on an annual basis. * "Good security practices are 'baked into' who we are and what we Impacting your organizational culture * Survey measuring people's attitudes, perceptions, and beliefs * Creating a metrics dashboard that combines all the
place for a long-term life cycle, including (at a minimum) an annual * Program has identified multiple different target groups that have do." takes much longer than impacting towards information security information/measurements from the different maturity levels.
review and update of the program. As a result, the program is an unique training requirements, including skills-based training for IT * Employees educate others on good security behaviors behavior. Impacting culture can take 3- * Number of people/departments requesting security briefings or * Tie in metrics to technical security metrics and ultimately organization's
established part of the organization’s culture and is current and and Developer groups. * Employees start providing ideas or suggestions on how to improve 10 years depending on the size, updates overall mission.
engaging. Program has gone beyond changing behavior and is * Leadership believes in and has invested in long-term support of the security in the organization complexity and age of your organization * Number of people submitting ideas on how to improve security
changing people's beliefs, attitudes, and perceptions of security. program. Program lead is actively updating leadership on a monthly * Employees or departments request security briefings/updates; they and it's culture (John Kotter, Leading * Number of people attending optional events
basis. are actively seeking more information Change). * Number of requests on how family can take the training
VALUE: Your organization is not only meeting compliance * Security team believes in investing in human controls just as much * Department leads and teams request security reviews/audits
requirements and managing its human risk. A strong culture enables as technical controls. Strong integration between awareness and * Departments beg to compete/compare who has the best security For this stage we recommend not
STAGE 04: Long-Term and promotes the success of other security initiatives and efforts and technical. * The security team and their security efforts are perceived as a focusing on changing your
Sustainment and Culture helps ensure security is built into almost all operational aspects of * Multiple FTEs dedicated to the program positive thing by the workforce organization's culture, but embedding
Change the organization, exponentially increasing the overall security of * Program has developed training modalities that engage the entire security into and aligning with your
organization. organization, such as a security ambassador / champion program or organization's existing culture.
gamification.

Program has a robust metrics framework aligned with the * Metrics are collected on a regular basis, often automated. * Leadership actively requests and uses security awareness metrics to This is a long term effort aligned with All the above combined into a single dashboard interface or
organization's mission to track progress and measure impact. As a * Metrics are integrated into security frameworks, such as the NIST measure their organizational progress / compare departments across your overall program, as you are some type of centralizing capability that can be visualized and
result, the program is continuously improving and able to Cybersecurity Framework or 20 Critical Controls. organization. continually updating and improving your easily reported to business partners. Metrics are measured over
demonstrate return on investment. Metrics are an important part of * Different metrics are delivered to different target audiences. ability to collect useful metrics that you time demonstrating long term impact. Strategic metrics include:
every stage. This stage simply reinforces that to truly have a mature * Metrics are provided to senior leadership demonstrating value at a can both act on and provide to
program, you must be able to demonstrate value to the organization business level and showing alignment with strategic business leadership. * Number of incidents
at a business level. priorities. * Time to detect an incident (attacker dwell time)
* Time to recover from an incident
VALUE: Your organization can identify the individuals, departments,
STAGE 05: Metrics or roles that represent the highest risk to your organization and the
Framework training that will most effectively manage that risk. In addition, you
can better prioritize and optimize the security controls that you
deploy to manage your risk. Finally, you can effectively demonstrate
the value of your program to senior leadership in business terms,
sustaining their long-term support.

This resource is part of the SANS MGT433 Managing Human Risk course. Learn more at https://sans.org/mgt433

You might also like