Information Security Management System Maturity Level Self-Assessment

Maturity Level of Information Security Management System in Your Organization.

Instructions
  • There are 10 questions.
  • Select the most appropriate option for each question.
  • You can select only one option per question.
  • Click Submit to process the assessment.

Levels:
  • Initial System: Culture:- Information Security is accepted as 'necessary evil'. Procedures and policies are paperwork. People:- Small IT team (mainly outsourced) only for basic system administration activities.No reporting in place. Process:- Informal and ad-hoc processes. No process approach implemented. Technology:- Basic security configurations on existing technologies.Decentralized security organization with limited coordination across functions.Focus mainly on prevention.
  • Developing System: Culture:- Information Security should be integrated into the business. We understand the necessity of information security. People:- Information Security is mainly IT department function, but general responsibilities and functions regarding information security are defined. Process:- Better coordination of security processes by IT.But processes remain informal, manual and dependent on individuals.Some elements of information security risk assessment is in place. Technology:- More advanced use of security technologies, adoption of tools for vulnerability detection, incident ticketing.
  • Advance/Mature System: Culture:- Information Security is part of the culture. People:- Information Security team has some autonomy from IT department.Staff has relevant security competence. Process:- Process approach implemented. Documented and formal information security processes that are regularly monitored and their effectiveness regularly measured.Information Security Risk management process is established and implemented. Technology:- Focus on incident prevention, detection and response. Vulnerability management full cicle has been implemented. Event logging and monitoring process has been introduced.
Question 1: What is the below options are most suitable for Your Information Security Governance?
Question 2: What is the below options are most suitable for Your Information security Risk Management?
Question 3: What is the below options are most suitable for Your Backup Restoration Process?
Question 4: What is the below options are most suitable for Your Physical Security?
Question 5: What is the below options are most suitable for Your Information Classification?
Question 6: What is the below options are most suitable for Your Human Resource Security?
Question 7: What is the below options are most suitable for Your Asset Management?
Question 8: What is the below options are most suitable for Your Information Security Incident Management?
Question 9: What is the below options are most suitable for Your Vulnerability Management?
Question 10: What is the below options are most suitable for Your Network Security?