Cybersecurity Capacity Maturity Model for Nations

From HandWiki

Cybersecurity Capacity Maturity Model for Nations (CMM) is a framework developed to review the cybersecurity capacity maturity of a country across five dimensions.[1] The five dimensions covers the capacity area required by a country to improve its cybersecurity posture.[2] It was designed by Global Cyber Security Capacity Centre (GCSCC) of University of Oxford and first of its kind framework for countries to review their cybersecurity capacity, benchmark it and receive recommendation for improvement.[3] Each dimension is divided into factors and the factors broken down into aspects.[2] The review process includes rating each factor or aspect along five stages that represents the how well a country is doing in respect to that factor or aspect.[2] The recommendations includes guidance on areas of cybersecurity that needs improvement and thus will require more focus and investment.[3] As at June, 2021, the framework has been adopted and implemented in over 80 countries worldwide.[4] Its deployment has been catalyzed by the involvement of international organizations such as the Organization of American States (OAS), the World Bank (WB), the International Telecommunication Union (ITU) and the Commonwealth Telecommunications Union (CTO) and Global Forum on Cyber Expertise (GFCE).[5]

Overview

The World Summit on Information Society identified capacity building in the realm of cybersecurity as one of the pillars necessary to reap the benefits of processes and services digitalization, especially in developing nations.[6] The International Telecommunication Union reported that developing nations lack the necessary cybersecurity capacity to manage ICT risk and respond to cyberthreats.[7] Because cyberattacks and vulnerabilities in one nation can affect other parts of the world, some maturity models were developed to assess the cybersecurity capacity of nations and benchmark the capacity level.[8] One of such models is the CMM.[8]

The CMM was developed in 2014, through collaborative effort between the GCSCC and over 200 experts from academia, international and regional organizations and the private sector.[9] CMM assesses the capacity of a country from five identified area called dimensions with the objective of improving the coverage, measurement and effectiveness of cyber security capacity building within five levels of progression.[10] Benchmarking of a country's cybersecurity capacity involves reviewing its initiatives and activities against the entire CMM and across all Dimensions.[2] According to the report of a regional CMM assessment of Latin America and the Caribbean, CMM assessment aims to identify cybersecurity gaps and discover actions that works.[11]

Since 2014, the CMM has undergone revisions and it is intended to be a living model that remain relevant to every aspect of cybersecurity needs at the national level.[2]

Structure

Structure of Cybersecurity Capacity Maturity Model for Nations (CMM)

The framework consists of dimensions, factors, aspects, indicators and stages.[2]

Dimension.

The dimensions represent the scope of a country's cybersecurity capacity that will be assessed by CMM and it is broken down into factors.[2] The dimensions are not stand alone, rather they are related to one another because a nation's performance in one dimension of capacity may require input from another dimension.[2]

The five dimensions from the 2021 version are:[2]

  • Developing cybersecurity policy and strategy - This dimension examines how a nation fares in terms of availability and implementation of Cybersecurity policies and strategy.
  • Encouraging responsible cybersecurity culture within society - This dimension views how well citizens of a nation are familiar with digital risk and the provision of a viable channel for reporting cybercriminal activities.
  • Building cybersecurity knowledge and capabilities - This dimension explores structures in place for cybersecurity awareness and education within the nation.
  • Creating effective legal and regulatory frameworks - Examine the ability of a country to develop, ratify and enforce cybersecurity and privacy related legislation.
  • Controlling risks through standards and technologies - This dimension examines the common use of cybersecurity standard and presence of structures for development of such technologies.

Factors:

The factors are the important component of a country's capacity whose maturity level is measured and there are 23 factors in the latest version with each having one

or more aspects [2]

Aspects:

These are smaller subdivision of factors which helps with understanding each factor and help in evidence gathering and measurement.[2]

Indicators:

Each Indicator define the actions that suggest that a nation has maintain a specific stage of maturity.[2] The level of maturity assigned to an aspect depend on the ability of a nation to fulfill the steps and actions listed as its indicator.[3] Evidence will be required to be provided before a particular stage can be attained.[3] It is either an

evidence is available or not and to move to a higher stage, all of the Indicators within a particular stage will need to have been fulfilled.[2]

Stage:

This represent how matured a nations is on each factor or aspect.[2] There are 5 stages of maturity; start-up, formative, established, strategic and dynamic. For a nation to met a particular maturity stage, it has to fulfill some indicators.[3]

  • Start-up - At this stage, a nation has no presentable evidence to show existence of cybersecurity initiatives.
  • Formative - Evidence is available to proof initiatives on some of the aspects, however these efforts may be at the initiation state or be ad hoc.
  • Established - The is evidence to show that the aspect is defined, functional and working but adequate resource allocation is lacking.
  • Strategic - Aspect has been prioritized based on national need.
  • Dynamic - A working adaptable cybersecurity strategy is available, which is evidenced by global leadership on cybersecurity issues, agility of decision-making, and resources allocation.

Development

The first version of the framework was released in 2014.[12] Based on pilot assessments conducted in six countries, improvements were made on the model and an updated version was published in 2017. Based on lessons learnt over the years from CMM deployments and consultations from GCSCC Expert Advisory Panel, strategic, regional and implementation partners of the GCSCC, and other experts from academia, international and regional organisations, governments, the private sector, and civil society, an updated version was released in 2021.[13]

The dimensions, factors and aspects have changed overtime between CMM versions. The 2014 has 5 dimensions and 21 factors.[12] The 2017 version has 5 dimensions with 24 factors.[11] The 2021 version has 5 dimensions and 23 factors.[2]

Table 1 lists the dimensions across the three versions.

Table 1 CMM Dimensions across versions
Dimensions 2014/2017 2021
D1 Cybersecurity Policy and Strategy Developing cybersecurity policy and strategy
D2 Cyber Culture and Society Encouraging responsible cybersecurity culture within society
D3 Cybersecurity Education, Training and Skills Building cybersecurity knowledge and capabilities
D4 Legal and Regulatory Frameworks Creating effective legal and regulatory frameworks
D5 Standards, organisations, and technologies Controlling risks through standards and technologies

Table 2 list the factors for each version.

Table 2. Factors in various versions.
Factors 2014 2017 2021
D1.1 Documented or Official National Cybersecurity Strategy National Cybersecurity Strategy National Cybersecurity Strategy
D1.2 Incident Response Incident Response Incident Report and Crisis Management
D1.3 Critical National Infrastructure Critical Infrastructure (CI) Protection Critical Infrastructure (CI) Protection
D1.4 Crisis Management Crisis Management Cybersecurity in Defense and National Security
D1.5 Cyber Defence Consideration Cyber Defence consideration
D1.6 Digital Redundancy Communications redundancy
D2.1 Cybersecurity Mind-set Cybersecurity mind-set Cybersecurity Mindset
D2.2 Cybersecurity Awareness Trust and confidence on the Internet Trust and Confidence in Online Service
D2.3 Confidence and Trust on the Internet User understanding of personal information protection on the Internet User Understanding of Personal Information Protection Online
D2.4 Privacy Online Reporting mechanisms Reporting Mechanisms
D2.5 Media and social media Media and Social Media
D3.1 National Availability of Cyber Education and Training Raising awareness Building Cybersecurity Awareness
D3.2 National Development of Cyber Security Education Framework for education Cybersecurity Education
D3.3 Training and Educational Initiatives within the Public and Private Sector Framework for professional training Cybersecurity Professional Training
D3.4 Corporate Governance, Knowledge and Standards Cybersecurity Research and Innovation
D4.1 Cybersecurity Legal Frameworks Legal frameworks Legal and Regulatory Provisions
D4.2 Legal Investigation Criminal justice system Related Legislative Framework
D4.3 Responsible Reporting Formal and informal cooperation frameworks to combat cybercrime Legal and Regulatory capability and Capacity
D4.4 Formal and Informal Co-operation Frameworks to Combat Cybercrime
D5.1 Adherence to Standards Adherence to standards Adherence to Standards
D5.2 Cybersecurity Coordinating Organisations Internet infrastructure resilience Security Controls
D5.3 National Infrastructure Resilience Software quality Software Quality
D5.4 Cybersecurity Marketplace Technical security controls Communications and Internet Infrastructure Resilience
D5.5 Cryptographic controls Cybersecurity Marketplace
D5.6 Cybersecurity marketplace Responsible Disclosure
D5.7 Responsible disclosure

The Review Process

CMM review process has 3 stages.[3][14]

Stage 1: Desk research and country-partner identification.

The first step is selection of a country. A CMM review can be requested by a country or a country can be selected for assessment by an international or regional organization.[3]

Once a nation is selected for assessment, a relationship is established with the host country and necessary stakeholders identified from academia, civil societies, government ministries/department, international organizations and the private sector.[2]

Stage 2: The Review

The actual review with the stakeholders is a three-day consultation process and based on the five dimensions, multiple teams are created across stakeholders .[2]

Open discussions or focus groups method is applied to ask and answers questions.[3] Questions and answer can also be collected using online tool.[15] Inability to provide evidence for all indicators under each aspect will result in a lower maturity level for that aspect.[3]

Remote follow-up sessions or email communication may be used for further data collection.[3]

Stage 3: Review Report

A report is presented to the country's government and it is at the discretion of that country to make it publicly available or not.[2]

The recommendation

The output of the CMM assessment is a report which details the gaps identified from each aspect and the present maturity level of each indicator.[15] The assessment report is the property of the assessed nation [16] and they choose whether to make it public or not.[3] Depending on a nation's need, it recommend areas that should be given priority in terms of resource allocation.[2]

The report include a sunburst representation of the cybersecurity capacity of the nation, reason for placing each factor or aspect in a particular stage and recommendation of what can be done to move up along the maturity stage.[17]

Sample results from some of the reviews are available on GCSCC's website.[4]

Nations with CMM Assessment

The GCSCC website has the list of nations that has been assessed, which have been listed below.[4]

Albania

Antigua and Barbuda

Argentina

Armenia

Bahamas

Bangladesh

Barbados

Belize

Benin

Bhutan

Bolivia

Bosnia and Herzegovina

Botswana

Brazil

Burkina Faso

Cabo Verde

Cameroon

Chile

Colombia

Cook Islands

Costa Rica

Cyprus

Dominica

Dominican Republic

Ecuador

El Salvador

Eswatini

Fiji

Gambia

Georgia

Ghana

Grenada

Guatemala

Guyana

Haiti

Honduras

Iceland

Indonesia

Ivory Coast

Jamaica

Kiribati

Kosovo

Kyrgyzstan

Lesotho

Liberia

Lithuania

Madagascar

Malawi

Mauritius

Mexico

Micronesia

Montenegro

Morocco

Mozambique

Myanmar

Namibia

Nicaragua

Niger

Nigeria

North Macedonia

Panama

Papua New Guinea

Paraguay

Peru

Rwanda

Saint Kitts and Nevis

Saint Lucia

Saint Vincent and the Grenadines

Samoa

Senegal

Serbia

Sierra Leone

Somalia

Sri Lanka

Suriname

Switzerland

Tanzania

Thailand

Tonga

Trinidad and Tobago

Tunisia

Tuvalu

Uganda

United Kingdom

Uruguay

Vanuatu

Venezuela

Zambia

References

  1. "Global Cyber Security Capacity Centre | Digital Watch". https://dig.watch/actors/global-cyber-security-capacity-centre. 
  2. 2.00 2.01 2.02 2.03 2.04 2.05 2.06 2.07 2.08 2.09 2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 Global Cyber Security Capacity Centre (2021). "Cybersecurity Capacity Maturity Model for Nations (CMM)". https://cybilportal.org/wp-content/uploads/2021/03/CMM2021-Edition-March-2021.pdf. 
  3. 3.00 3.01 3.02 3.03 3.04 3.05 3.06 3.07 3.08 3.09 3.10 The World Bank. "Global Cybersecurity Capacity Program. "Lessons Learned and Recommendations towards strengthening the Program"". https://documents1.worldbank.org/curated/en/947551561459590661/pdf/Global-Cybersecurity-Capacity-Program-Lessons-Learned-and-Recommendations-towards-Strengthening-the-Program.pdf. 
  4. 4.0 4.1 4.2 "CMM Reviews around the World" (in en). https://gcscc.ox.ac.uk/cmm-reviews#/. 
  5. RAND (2017). "Developing Cybersecurity Capacity. A proof-of-concept implementation guide". https://www.rand.org/content/dam/rand/pubs/research_reports/RR2000/RR2072/RAND_RR2072.pdf. 
  6. International Telecommunication Union (2015). "WSIS+10 Statement on the Implementation of the WSIS Outcomes". https://www.itu.int/net/wsis/review/inc/docs/final/wsis10.statement.pdf. 
  7. "Enhancing Cybersecurity in Least Developed Countries" (in en-US). https://www.itu.int:443/en/ITU-D/Cybersecurity/Pages/CYBLDC.aspx. 
  8. 8.0 8.1 "Advancing Cybersecurity Capacity Building: Implementing a Principle-Based Approach" (in en-US). https://www.gppi.net/2017/03/06/advancing-cybersecurity-capacity-building-implementing-a-principle-based-approach. 
  9. "National cybersecurity capacity maturity assessment". https://www.nrdcs.lt/en/services/national-cybersecurity-capacity-maturity-assessment-/28. 
  10. Klimburg, Alexander; Zylberberg, Hugo (2015). "Cyber Security Capacity Building: Developing Access". https://www.files.ethz.ch/isn/195765/NUPI_Report_6_15.pdf. 
  11. 11.0 11.1 "2020 Cybersecurity Report: Risks, Progress, and the Way Forward in Latin America and the Caribbean | Publications". https://publications.iadb.org/publications/english/document/2020-Cybersecurity-Report-Risks-Progress-and-the-Way-Forward-in-Latin-America-and-the-Caribbean.pdf. 
  12. 12.0 12.1 Global Cyber Security Capacity Centre (2015). "Cybersecurity Capacity Assessment of the Republic of Kosovo". https://gcscc.ox.ac.uk/files/cmmreviewreportkosovojune2015pdf. 
  13. "Development and Evolution of the CMM" (in en). https://gcscc.ox.ac.uk/development-and-evolution-of-the-cmm#/. 
  14. "CMM Review Process" (in en). https://gcscc.ox.ac.uk/cmm-review-process#/. 
  15. 15.0 15.1 Organization of American States (2016). "Cybersecurity Are We Ready in Latin America and the Caribbean?". https://gcscc.ox.ac.uk/files/cybersecurity-are-we-prepared-latin-america-and-caribbeanpdf. 
  16. Designer (2019-11-22). "The CMM - Oceania Cyber Security Centre" (in en-AU). https://ocsc.com.au/capacity-initiatives/the-cmm/. 
  17. The World Bank (April 2019). "CYBERSECURITY CAPACITY REVIEW The Gambia". https://www.pura.gm/wp-content/uploads/2019/07/CMM-report_Gambia_2019.pdf.