
 
evolve, instantaneously altering the data from the 
scoreboard, and thus permitting the enterprises 
management to be aware of the situation and to 
make decisions in a reasonable amount of time. 
The remainder of this paper is organized as 
follows: Section 2 very briefly describes existing 
maturity models, their current tendencies and some 
of the new proposals that are appearing. Section 3, 
introduces our proposal for a maturity model 
orientated towards SMEs. Section 4 we show some 
of the results obtained after applying our model to 
real practical cases, centring on the results obtained 
to date in the phase which permits the establishment 
of the enterprises current situation with regard to the 
security management level. Finally, in Section 5, we 
shall conclude by discussing our future work on this 
subject. 
2 RELATED WORK 
Security maturity models (Eloff and Eloff, 2003; 
Lee and Lee et al., 2003; Aceituno, 2005) seek to 
establish a standardized validation with which the 
state of the information security within an 
organisation can be determined, and which will 
allow us to plan the route which must be followed if 
we are to attain the desired security goals. 
Among the information security maturity models  
which are most frequently applied in enterprises at 
present, those which are most outstanding are the 
SSE-CMM (Systems Security Engineering 
Capability Maturity Model), COBIT and ISM3 
(Walton, 2002), and although research has been 
carried out to develop new models (Eloff and Eloff, 
2003; Lee and Lee et al., 2003), none has been able 
to solve the current problems which occur when 
these models are applied in SMEs. 
Other proposals take Risk Analysis as being the 
central nucleus of ISMS (Information Security 
Management System). As opposed to these models, 
in our case, although Risk Analysis is highly 
important, it is still only another piece in the system. 
Siegel (Siegel and Sagalow et al., 2002) point out 
that the information security models which centre 
exclusively upon risk elimination models are not 
sufficient, and Garigue (Garigue and Stefaniu, 2003) 
furthermore note that at present managers not only 
wish to know what has been done to mitigate these 
risks, but that they should also be able to discover, in 
an efficient manner, that this task has been carried 
out and that costs have been reduced. 
The main problem with the majority of the 
maturity models mentioned is that they are not 
successful when implanted in SMEs, mainly due to 
the fact that they were developed for large 
organisations and their associated organisational 
structure. Their structures are, therefore, rigid, 
complex and costly to implement, which makes 
them unsuitable for an SME environment. 
The vision of how to tackle these maturity levels 
varies according to the authors who confront the 
problem. Some authors therefore insist upon using 
the ISO/IEC17799 international standard in security 
management models, but always do so in an 
incremental manner, considering the particular 
security needs (Von Solms and Von Solms, 2001; 
Walton, 2002; Eloff and Eloff, 2003; Barrientos and 
Areiza, 2005). 
The proposal that we have developed is also 
based on the ISO27002 International Standard, but 
its application is SME oriented, thus avoiding the 
problems detected in current models, which require 
more resources then the enterprise is able to provide, 
which in its turn leads to a higher risk of failure in 
implantation and maintenance, which is 
unacceptable for this type of companies. 
3 MODEL 
Earlier versions of the model have been presented in 
previous papers (Sánchez and Villafranca et al., 
2007a). Therefore, in this section we present a 
highly resumed description of the models principal 
phases.  
The Information Security Maturity Model that 
we propose allows any organisation to evaluate the 
state of its security, but is mainly oriented towards 
SMEs through the development of security 
management models which are simple, economical, 
rapid, automated, progressive and sustainable, these 
being the main requirements of this type of 
companies when implanting these models. 
One of the objectives in the development of the 
entire process is that of obtaining the greatest 
possible level of automation with the minimum 
amount of information collected in the shortest 
possible time. In our system we have prioritized 
speed and cost reduction, thus sacrificing the 
precision offered by other models, which is to say 
that our model seeks one of the best security 
configurations, but not that which is optimum, and 
time and cost reduction are always prioritized.  
Another of the major contributions of our model 
is a set of matrices which allows us to relate the 
different components of the ISMS that the system 
uses to automatically generate a great part of the 
necessary information, thus notably reducing the 
time needed to develop and implant the ISMS. 
SECRYPT 2008 - International Conference on Security and Cryptography
392