This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture within their organization. It then suggests a security architecture maturity rating and provides an appropriate security architecture diagram template for that rating.
Instructions:
- Complete the Complexity, Operational, and Value Assessments on tabs 2, 3, and 4 respectively. Answer each question as accurately as possible. For the "Value Assessment" tab, have various relevant stakeholders give their answers to the questions provided and then amalgamate them into one assessment.
- Review the recommended security architecture maturity on the "Results" tab and read through the interpretations of the different maturity levels. Review the suggested security architecture diagram template. Use these results to support you in building a comprehensive set of initiatives to reach the target state.
- Read through the generated tab 6 to understand possible opportunities that would be effective in building and/or improving your security architecture. Select the "Year To Do" for each goal to generate a prioritized list in tab 7, "Roadmap." Look through this tab to review the goals and when they should be accomplished.