Security Operations Maturity Assessment (SOMA).

5 Step Assessment

Find out in just 3 minutes how mature your organisations Security Operations are. In this high-level assessment, we cover Incident Management Policy and Governance, Technologies and Telemetry, Automation and Response, and Security Analytics and Forensics. Your results will include an overall score, individual ratings for each section and advice on what to focus on next.

In our 5 step assessment you are here:
Question of

Incident Management Policy & Governance

Do you have a published Incident Management Policy/Procedure?

Do you define Incident Management Roles & Responsibilities within your Policy Framework?

Do you conduct Incident Response (IR) testing?

Do you provide Security Awareness Training (SAT) and simulation exercises for your end users?

Question of

Technologies & Telemetry

Has your organisation implemented perimeter and/or network detection technologies?

Has your organisation implemented Next Generation Anti-Virus (NGAV) or Endpoint Detection & Response (EDR) technologies?

Has your organisation implemented a centralised logging solution/infrastructure?

Has your organisation implemented logging for foundational log sources (Windows/DC)?

Has your organisation implemented a Security Information and Event Management (SIEM) or another log correlation technologies such as a Syslog Server, User & Entity Behaviour Analytics (UEBA), or Network Behavioural & Anomaly Detection (NBAD)?

Question of

Automation & Response

Does your organisation have a published Incident Response (IR) plan?

Does your organisation have scenario-based playbooks?

Does your organisation utilise automation for business processes, IT operations or security?

What is your senior leadership’s expectations of Mean Time To Respond (MTTR) to a security incident?

Question of

Security Analytics & Forensics

How does your organisation keep on top of the latest Cyber Threat Intelligence (CTI) and security advisories?

Does your organisation have policy and technical controls in place for the forensic recovery and analysis of assets and images?

Does your organisation have an Incident Response (IR) retainer with a third-party supplier?

Does your organisation have any IT security governance committee and/or external regulator reporting requirements?

Get your results

Thanks for filling in our Security Operations Maturity Assesment; please fill in your details so we can guide you on how to make impactful improvements to your cyber security operations.