Security Maturity Assessment

My Assessments →

Select a pattern to assess your organisation against. Rate each control area on a 1-5 maturity scale and get a radar chart, gap analysis, and threat exposure assessment. All data is encrypted in your browser with AES-256-GCM before reaching our servers — we cannot read your scores or notes.

CSF

NIST Cybersecurity Framework 2.0

Framework Assessment
CSF-2.0

Score your current vs target maturity across 6 core functions and 22 categories. Identify gaps, prioritise remediation, and map to OSA patterns.

6 functions 22 categories Current + Target scoring

Pattern Assessments

CBDC and Digital Currency Infrastructure

SP-054

Security architecture for central bank digital currency (CBDC) and digital currency infrastructure covering retail and wholesale CBDC models, dual-led...

7 control areas 50 controls 10 threats

Zero-Knowledge Proof Architecture

SP-053

Security architecture for zero-knowledge proof (ZKP) systems covering ZK-SNARK and ZK-STARK proof systems, trusted setup ceremony security, ZK-rollup ...

8 control areas 32 controls 10 threats

Decentralised Identity & Verifiable Credentials

SP-052

Security architecture for decentralised identity (DID/SSI) systems covering W3C DID method selection and resolution, Verifiable Credential (VC) issuan...

11 control areas 35 controls 10 threats

Tokenised Asset Security Architecture

SP-051

Security architecture for institutional tokenised asset platforms covering custody architecture (HSM, MPC, threshold signatures), smart contract secur...

8 control areas 36 controls 10 threats

Mobile Security Architecture

SP-050

Comprehensive mobile security architecture pattern covering certificate pinning, secure enclave usage, biometric authentication, mobile payment securi...

6 control areas 38 controls 12 threats

AI in Security Operations

SP-049

Security architecture for the use of AI in defensive security operations — AI-augmented threat detection, AI-assisted incident triage and response, AI...

8 control areas 26 controls 10 threats

Secure Agentic AI Frameworks

SP-047

Enterprise security architecture for adopting agentic AI frameworks (LangChain, CrewAI, AutoGen, LangGraph, and similar orchestration platforms) safel...

8 control areas 33 controls 16 threats

External Attack Surface Management

SP-046

Comprehensive pattern for discovering, monitoring, and managing an organisation's internet-facing digital assets. Covers automated asset discovery, DN...

8 control areas 28 controls 10 threats

AI Governance and Responsible AI

SP-045

A governance pattern for establishing and operating an AI management system (AIMS) across the enterprise. Covers training data governance, model lifec...

7 control areas 34 controls 11 threats

SaaS Identity Lifecycle Management

SP-044

A security architecture pattern for managing the full identity lifecycle across SaaS applications -- from provisioning and role assignment through acc...

7 control areas 32 controls 12 threats

Secure Application Baseline for Developers

SP-041

Architecture pattern bridging the gap between security control frameworks and practical software implementation. Provides developer-centric guidance f...

9 control areas 32 controls 12 threats

Post-Quantum Cryptography and Quantum Readiness

SP-040

Architecture pattern for migrating enterprise cryptographic infrastructure to post-quantum algorithms. Covers crypto agility, cryptographic inventory ...

9 control areas 26 controls 12 threats

Client-Side Encryption and Data Privacy

SP-039

Pattern for implementing client-side encryption to protect sensitive user data before it reaches the server. Covers browser-based cryptography via Web...

6 control areas 28 controls 12 threats

Vulnerability Management and Patching

SP-038

End-to-end vulnerability management pattern covering asset discovery, vulnerability scanning, risk-based prioritisation, patch management lifecycle, e...

7 control areas 25 controls 12 threats

Privileged User Management

SP-037

Comprehensive privileged access management pattern covering credential vaulting, just-in-time access, session recording, standing privilege eliminatio...

7 control areas 33 controls 12 threats

Incident Response

SP-036

End-to-end incident response pattern covering preparation, detection, triage, containment, eradication, recovery, and post-incident review. Addresses ...

8 control areas 33 controls 12 threats

Offensive Security Testing

SP-035

Governance and execution pattern for red teaming, blue teaming, purple teaming, and intelligence-led penetration testing (CBEST, TIBER-EU). Covers thr...

7 control areas 29 controls 10 threats

Cyber Resilience

SP-034

Enterprise architecture pattern for designing systems that survive cyber attacks, maintain critical operations under degraded conditions, and recover ...

7 control areas 37 controls 12 threats

Passkey Authentication

SP-033

Deep-dive pattern for implementing phishing-resistant passwordless authentication using FIDO2 WebAuthn and passkeys. Covers platform authenticators, r...

7 control areas 28 controls 10 threats

Modern Authentication

SP-032

Enterprise authentication architecture pattern covering directory services, federation, and token-based authentication using OIDC, OAuth 2.0, and JWT....

7 control areas 33 controls 12 threats

Security Monitoring and Response

SP-031

End-to-end security operations pattern covering the full detection and response lifecycle: telemetry collection from endpoints, networks, and cloud; c...

7 control areas 36 controls 12 threats

API Security

SP-030

Comprehensive security pattern for protecting application programming interfaces across their full lifecycle. Maps 45 NIST 800-53 controls to the crit...

8 control areas 45 controls 12 threats

Zero Trust Architecture

SP-029

Enterprise security architecture pattern that eliminates implicit trust, enforcing continuous verification of every user, device, and workload before ...

8 control areas 51 controls 12 threats

Secure DevOps Pipeline Pattern

SP-028

Security architecture for CI/CD pipelines, DevSecOps practices, and software delivery automation. Covers pipeline infrastructure hardening, secrets ma...

13 control areas 49 controls 15 threats

Secure LLM Usage

SP-027

Security architecture for integrating large language models (LLMs) into enterprise environments. Covers prompt injection and jailbreaking defences, ou...

8 control areas 26 controls 10 threats

PCI Full Environment

SP-026

Security architecture for a fully PCI DSS compliant cardholder data environment. Covers CDE scoping and segmentation, cardholder data protection with ...

7 control areas 32 controls 10 threats

Advanced Monitoring and Detection

SP-025

Security architecture for building advanced detection and response capabilities against sophisticated threats. Covers SIEM deployment, security operat...

7 control areas 33 controls 10 threats

Industrial Control Systems

SP-023

Security architecture for protecting industrial control systems (ICS), SCADA, and operational technology environments. Covers network segmentation bet...

9 control areas 34 controls 12 threats

Secure Ad-Hoc File Exchange Pattern

SP-019

Security architecture for enabling secure, business-driven file sharing with external partners without pre-established federation. Covers encrypted fi...

7 control areas 25 controls 10 threats

Information Security Management System (ISMS) Module

SP-018

Security architecture for establishing, operating, and continuously improving an Information Security Management System aligned with ISO 27001. Covers...

6 control areas 29 controls 10 threats

DMZ Module

SP-016

Security architecture for designing and operating a demilitarized zone (DMZ) network segment. Covers multi-tier firewall topologies, bastion host hard...

7 control areas 31 controls 10 threats

Secure Remote Working

SP-015

Comprehensive remote and hybrid working security pattern covering endpoint hardening, ZTNA and VPN architectures, BYOD and corporate device management...

7 control areas 25 controls 10 threats

Data Security Pattern

SP-013

Security architecture for classifying, protecting, and controlling data throughout its lifecycle. Covers data classification schemes, encryption at re...

7 control areas 33 controls 10 threats

Secure Software Development Lifecycle

SP-012

End-to-end secure SDLC pattern covering threat modelling in design, secure coding standards, static and dynamic analysis, software composition analysi...

7 control areas 26 controls 10 threats

Cloud Computing Pattern

SP-011

Security architecture for organisations consuming or providing cloud services, addressing the shared responsibility model, data sovereignty, identity ...

7 control areas 54 controls 10 threats

Public Web Server Pattern

SP-008

Security architecture for internet-facing web applications, covering network segmentation, input validation, session management, TLS configuration, DD...

7 control areas 38 controls 10 threats

Server Module

SP-002

Reusable security module defining the standard control baseline for server systems including physical, virtual, and cloud-hosted instances. Referenced...

7 control areas 90 controls 10 threats

Client Module

SP-001

Reusable security module defining the standard control baseline for client endpoints including desktops, laptops, and workstations. Referenced as a bu...

7 control areas 80 controls 10 threats