Security Capability Model

What an organisation must be able to do — independent of technologies, products, or controls.

The OSA Security Capability Model organises everything an organisation must be able to do in cybersecurity into three phases: Foundation (governance, people, supply chain), Protect (the seven asset classes to secure), and Operate (detection, response, continuity). Each capability area breaks down into strategic capabilities (L1) and architectural sub-capabilities (L2), grounded in the OSA pattern catalogue.

OSA SECURITY CAPABILITY MODEL v0.5 FOUNDATION Governance, people, and supply chain CA-01 Governance, Risk & Compliance Policy · Risk · Audit · Compliance SP-018 SP-022 SP-026 SP-043 CA-02 Human & Organisational Security Awareness · Culture · Insider Threat SP-014 SP-021 SP-022 CA-03 Supply Chain & Third-Party Risk Vendor Risk · SBOM · Third-Party Access SP-042 PROTECT Seven asset classes to secure CA-04 Identity & Access Mgmt AuthN · Federation · PAM · Machine ID SP-010 SP-032 SP-033 SP-037 SP-044 CA-05 Device & Endpoint Trust MDM · EDR · BYOD · Posture SP-001 SP-003 SP-006 SP-007 SP-024 CA-06 Network & Infrastructure ZTNA · Segmentation · DMZ · OT SP-015 SP-016 SP-017 SP-023 SP-029 CA-07 Application & API Security SDLC · SAST/DAST · API · WAF SP-004 SP-005 SP-008 SP-012 SP-028 SP-030 SP-041 CA-08 Data & Information Protection Classification · DLP · Encryption · Transfer SP-013 SP-019 SP-020 SP-039 SP-040 CA-09 Cloud & Platform Security CSPM · CWPP · Cloud IAM · IaC SP-002 SP-011 SP-028 CA-10 AI & Agentic Security AI Governance · Prompt Safety · Agents SP-027 SP-045 SP-047 OPERATE Detection, response, continuity CA-11 Threat Detection & Security Ops SIEM · Threat Intel · Hunting · Vuln Mgmt SP-025 SP-031 SP-035 SP-038 SP-046 CA-12 Incident Response & Business Continuity IR Playbooks · Crisis · BCP · Lessons SP-034 SP-036 CA-13 IT Service Continuity & Recovery HA Tiers · Immutable Backup · DR SP-034 Click any pattern badge to explore · opensecurityarchitecture.org v0.5 · 2026

Click any pattern badge to explore its details

Download SVG
Phases 3
Capability Areas 13
L1 Strategic 52
L2 Architectural 207
Version 0.5

Foundation

What must exist before anything else can work — governance, people, and supply chain

CA-01 Governance, Risk & Compliance

Define, govern, measure and continuously improve the organisation's security posture in alignment with business strategy and regulatory obligations.

Cross-cutting Govern, Identify

L1 Clear Security Rules That Everyone Knows How to Follow

  • Security Policy Hierarchy
  • Standards & Procedures Lifecycle
  • Exception & Waiver Management
  • Regulatory Requirements Translation

L1 Risk Decisions Grounded in Evidence, Not Gut Feel

  • Enterprise Risk Taxonomy & Register
  • Risk Treatment & Acceptance
  • Risk Appetite & Tolerance Definition
  • Control Effectiveness Assessment

L1 Audit Readiness Built In, Not Bolted On

  • Multi-Framework Control Traceability SP-026
  • Compliance Evidence Repository SP-018
  • Internal Audit Programme
  • Regulatory Change Management

L1 Security Performance Visible to the Board and Leadership

  • Security KRI/KPI Framework SP-043
  • Board & Executive Reporting SP-022
  • Security Investment Tracking
  • Security Assurance Dashboard

CA-02 Human & Organisational Security

Reduce the human-layer attack surface through awareness, cultural embedding, and insider threat management — recognising that people are simultaneously the greatest risk and the most important security asset.

Cross-cutting Govern, Protect

L1 Staff Who Know How to Spot and Respond to Threats

  • Role-Based Security Awareness SP-014
  • Phishing Simulation Programme
  • Executive & Board Security Education SP-022
  • Just-in-Time Coaching & Nudging

L1 Security as a Shared Habit, Not Just a Team's Responsibility

  • Security Champion Network
  • Security Culture Maturity Measurement
  • Developer Security Enablement
  • Security Feedback & Recognition

L1 Detecting When Trusted People Become a Risk

  • Insider Threat Policy & Programme
  • Behavioural Analytics (UEBA)
  • DLP-UEBA Correlation
  • Investigation & Response Procedures

L1 Collaboration Tools That Don't Become a Leakage Channel

  • Secure Collaboration Platform Controls SP-021
  • External Sharing Governance
  • Information Barrier Enforcement
  • Meeting & Channel Security

CA-03 Supply Chain & Third-Party Risk

Identify, assess, and continuously monitor the security posture of third parties, vendors, and software dependencies — preventing the extended enterprise from becoming an uncontrolled attack surface.

Cross-cutting Govern, Identify

L1 Suppliers Assessed for Security Before and After Onboarding

  • Vendor Risk Tiering & Assessment SP-042
  • Continuous Vendor Security Monitoring
  • Contractual Security Requirements & Baseline
  • Right-to-Audit & Evidence Collection

L1 Every Software Component Tracked and Checked for Known Weaknesses

  • Software Bill of Materials (SBOM)
  • Open-Source Dependency Governance
  • Dependency Vulnerability Tracking (SCA)
  • Artefact Signing & Approved Registry

L1 External Access That Expires and Leaves a Full Record

  • Vendor Access Provisioning & Governance
  • Time-Limited & JIT Third-Party Access
  • Third-Party Session Recording
  • Segregated Network Access for Vendors

L1 Understanding Which Suppliers You Cannot Afford to Lose

  • Critical Supplier Identification & Mapping
  • Concentration Risk Assessment
  • Alternative Supplier Planning
  • Supply Chain Incident Response

Protect

The seven asset classes to secure, ordered by ZTA pillar and extended with AI-specific governance

CA-04 Identity & Access Management

Establish, govern, and continuously verify the identity of every user, service, and machine — enforcing least-privilege access across all resources.

Identity Protect

L1 Secure Sign-In That Needs No IT Support

  • Multi-Factor Authentication
  • Phishing-Resistant / Passkey Authentication SP-033
  • Adaptive & Risk-Based Authentication
  • Enterprise Federation & SSO SP-032

L1 The Right Access for the Right Job

  • Joiner-Mover-Leaver Automation SP-010
  • Access Certification & Entitlement Review
  • SaaS Identity Provisioning & SCIM SP-044
  • Role & Attribute-Based Access Control

L1 Admin Access That Expires When the Task Is Done

  • Privileged Credential Vault SP-037
  • Just-in-Time & Just-Enough Access SP-037
  • Privileged Session Recording & Monitoring SP-037
  • Standing Privilege Elimination

L1 Every System Has Its Own Secure Identity

  • Service Account Governance
  • PKI & Certificate Lifecycle Management
  • Workload Identity Federation (SPIFFE/SPIRE)
  • Secrets & Dynamic Credential Management

CA-05 Device & Endpoint Trust

Assess, enforce, and continuously verify the security posture of every endpoint — managed and unmanaged — as a prerequisite for resource access.

Devices Protect

L1 Every Device Configured Correctly and Kept Up to Date

  • Unified Endpoint Management (MDM/UEM) SP-001
  • Configuration Baseline & Hardening
  • Software Inventory & Application Control
  • Patch Lifecycle Management SP-038

L1 Active Defences on Every Device That Catch What Antivirus Misses

  • Endpoint Detection & Response (EDR/XDR)
  • Anti-Malware & Behavioural Detection
  • Application Allowlisting
  • Full-Disk Encryption & Hardware Security (TPM/Secure Boot)

L1 Personal Devices That Can Safely Access Company Tools

  • Corporate Mobile Management SP-024
  • BYOD Containerisation SP-003
  • Mobile Threat Defence (MTD)
  • Wireless Access Security SP-006SP-007

L1 Only Healthy Devices Are Allowed to Connect

  • Device Posture Evaluation
  • Compliance-Gated Access (ZTNA Integration)
  • Hardware Root of Trust
  • Continuous Compliance Monitoring

CA-06 Network & Infrastructure Security

Segment, protect, and monitor network infrastructure — replacing perimeter-centric models with dynamic, policy-driven access based on identity and context.

Networks Protect

L1 Access That Checks Who You Are, Not Where You Are

  • ZTNA Platform & Policy Engine SP-029
  • Secure Remote Access / VPN Replacement SP-015
  • SASE Architecture & Convergence
  • Context-Aware Access Brokering

L1 Walls Inside the Network That Contain a Breach

  • Network Security Zone Model SP-017
  • Micro-Segmentation (Workload-to-Workload)
  • DMZ Architecture & Isolation SP-016
  • East-West Traffic Control

L1 Filters and Guards That Block Harmful Traffic

  • Next-Generation Firewall & IPS
  • Network Detection & Response (NDR)
  • DNS Security (Protective DNS, DNSSEC)
  • DDoS Protection

L1 Industrial Systems Kept Separate From Office Networks

  • OT Network Isolation SP-023
  • Purdue Model Segmentation
  • Unidirectional Gateway Architecture
  • OT Asset Visibility & Inventory

CA-07 Application & API Security

Design, build, and operate applications and APIs with security embedded throughout the software delivery lifecycle — treating code, dependencies, and runtime as the attack surface.

Applications Protect

L1 Security Built Into Software Before It Ships

  • Secure SDLC Policy & Phase Gates SP-012
  • Threat Modelling
  • Security Architecture Review
  • Developer Security Enablement

L1 Applications Tested for Weaknesses Before They Reach Customers

  • Static Analysis (SAST)
  • Dynamic Analysis (DAST)
  • Software Composition Analysis (SCA) SP-028
  • Penetration Testing SP-035

L1 APIs That Only Do What They Are Supposed To Do

  • API Gateway & Traffic Management SP-030
  • Authentication & Authorisation (OAuth 2.0 / OIDC)
  • Input Validation & Schema Enforcement
  • SOA & Microservice Security SP-004SP-005

L1 Active Protection for Applications Running in Production

  • Web Application Firewall (WAF) SP-008
  • Runtime Application Self-Protection (RASP)
  • Secrets Detection & Vault Integration
  • Secure Application Baseline SP-041

CA-08 Data & Information Protection

Classify, protect, and govern data throughout its entire lifecycle — at rest, in transit, in use, and in shared contexts — including future-proof cryptographic resilience.

Data Protect

L1 Knowing What Data You Hold and How Sensitive It Is

  • Data Classification Framework SP-013
  • Data Discovery & Inventory
  • Retention, Backup Classification & Disposal Policy
  • Privacy by Design

L1 Sensitive Data Cannot Leave Without Authorisation

  • Endpoint DLP
  • Network DLP
  • Cloud DLP
  • Information Rights Management (IRM/DRM)

L1 Data Protected by Encryption Throughout Its Lifecycle

  • Encryption at Rest & in Transit
  • Client-Side Encryption SP-039
  • Key Management Service (KMS/HSM)
  • Post-Quantum Cryptography Migration SP-040

L1 Data Shared Externally Arrives Intact and Unread by Others

  • Secure File Transfer SP-019
  • Email Transport Security — DMARC/DKIM/SPF SP-020
  • Data Sharing Agreements & Controls
  • Tokenisation & Data Masking

CA-09 Cloud & Platform Security

Secure cloud infrastructure, workloads, and platform services across multi-cloud and hybrid environments — enforcing the shared responsibility model and preventing cloud-native misconfiguration.

Infrastructure Protect

L1 Cloud Settings Checked Continuously for Dangerous Misconfigurations

  • Cloud Security Posture Management (CSPM)
  • Infrastructure-as-Code Security Scanning SP-028
  • Compliance Benchmark Enforcement (CIS, NIST)
  • Cloud Drift Detection & Automated Remediation

L1 Servers and Containers Protected While They Run

  • Cloud Workload Protection (CWPP)
  • Container & Kubernetes Security
  • Serverless Security
  • Server Hardening & Baseline SP-002SP-011

L1 Cloud Access Rights That Don't Accumulate Unchecked

  • Cloud IAM Governance
  • Cloud Infrastructure Entitlement Management (CIEM)
  • SaaS Security Posture Management (SSPM)
  • Cross-Cloud Identity Federation

L1 Cloud Infrastructure Designed to Be Secure by Default

  • VPC Design & Private Endpoints
  • Cloud-Native Firewall & Security Groups
  • Cloud Key Management & Encryption
  • Cloud Storage Security & Cross-Region Backup Replication

CA-10 AI & Agentic Security

Govern, secure, and assure AI systems and autonomous agents — addressing AI-specific attack surfaces, model integrity, and the novel trust and control challenges introduced by agentic architectures.

Cross-cutting (emerging) Govern, Protect

L1 Every AI System Assessed and Approved Before It Goes Live

  • AI Model Inventory & Risk Classification SP-045
  • AI Use Case Assessment & Approval
  • Responsible AI — Bias, Fairness, Explainability
  • AI Regulatory Compliance (EU AI Act, NIST AI RMF)

L1 Protecting AI Systems From Being Manipulated or Misused

  • Prompt Injection Detection & Filtering SP-027
  • AI Input/Output Monitoring
  • Model Access Controls & Authorisation
  • AI Audit Logging & Traceability

L1 Keeping Autonomous AI Within Strict Boundaries

  • Minimal Tool Authority / Agent Least Privilege SP-047
  • Human-in-the-Loop Oversight Gates SP-047
  • Agent Blast Radius Containment SP-047
  • Agentic Orchestration Security SP-047

L1 AI Models From Trusted Sources, Tested Before Deployment

  • Model Provenance & Signing
  • Approved Model Registry
  • Training Data Governance
  • AI Red Teaming & Adversarial Testing

Operate

Continuous detection, response, continuity, and resilience

CA-11 Threat Detection & Security Operations

Continuously monitor the entire attack surface, detect adversarial activity early, and operate a coordinated security operations function — intelligence-led and MITRE ATT&CK-aligned.

Visibility & Analytics Detect, Identify

L1 Suspicious Activity Spotted Early Across Every System

  • SIEM: Log Aggregation & Correlation SP-031
  • User & Entity Behaviour Analytics (UEBA)
  • Cloud & Identity Telemetry Integration
  • Advanced Detection Engineering SP-025

L1 Knowing Which Threats Are Headed Your Way and How They Work

  • Threat Intelligence Platform (TIP)
  • Strategic & Tactical Intelligence Consumption
  • Indicator of Compromise (IOC) Management
  • ATT&CK-Aligned TTP Tracking

L1 Continuously Testing Whether Defences Actually Detect Attacks

  • Detection-as-Code & Rule Development
  • MITRE ATT&CK Coverage Mapping
  • Threat Hunting
  • Breach & Attack Simulation (BAS)

L1 Vulnerabilities Found and Fixed Before Attackers Use Them

  • Vulnerability Management & Prioritisation SP-038
  • External Attack Surface Management (EASM) SP-046
  • Security Configuration Assessment
  • Deception & Honeypots

CA-12 Incident Response & Business Continuity

Prepare for, detect, contain, eradicate, and recover from security incidents — maintaining business continuity under adversarial conditions and enabling organisational learning.

Automation & Orchestration Respond, Recover

L1 A Practised Plan for When Things Go Wrong

  • IR Plan & Playbook Library SP-036
  • Incident Detection, Triage & Classification
  • Containment & Eradication Procedures
  • Digital Forensics & Evidence Preservation (DFIR)

L1 The Right Message Reaches the Right People During a Crisis

  • Crisis Management & War-Room Coordination
  • Regulatory Notification & Reporting
  • Internal Stakeholder Communication
  • External & Media Management

L1 Critical Operations Keep Running When Systems Are Disrupted

  • Business Impact Analysis (BIA)
  • Business Continuity Planning & Failover
  • RTO/RPO Definition & Testing
  • Tabletop Exercises & Simulations SP-034

L1 Every Incident Leaves the Organisation Stronger

  • Post-Incident Review (PIR) & Root Cause Analysis
  • Lessons-Learned Integration & Control Improvement
  • Resilience Metrics & Recovery Assurance
  • Continuous Improvement Feedback Loop

CA-13 IT Service Continuity & Recovery

Ensure critical IT services can continue or be restored within agreed timeframes after disruption — from planned failover through to recovery under destructive adversarial conditions — with architecturally enforced backup protections that prevent data loss.

Infrastructure Protect, Recover

L1 Defined HA Architecture Tiers Matched to Service Level Classes

  • Service Criticality Tiering & Classification Framework
  • Reference HA Architecture per Tier (active-active, active-passive, warm standby, backup-only)
  • Service-to-Tier Assignment, Gap Analysis & Compliance Monitoring

L1 IT Services Mapped, Prioritised and Designed to Fail Over

  • IT Service Dependency Mapping & Critical Service Identification
  • Failover Architecture Design per Assigned Tier
  • Service Recovery Prioritisation & Sequencing

L1 Backup Architecture That Attackers Cannot Reach or Destroy

  • Immutable Backup Storage (WORM / append-only)
  • Air-Gapped & Offline Vault
  • Backup Encryption & Key Segregation

L1 Recovery Tested, Proven and Executable Under Adversarial Conditions

  • Backup Coverage & Gap Analysis
  • Automated Integrity Verification & Monitoring
  • Clean-Room / Isolated Restore Environment
  • Tiered Recovery Prioritisation (crown jewels first)
  • Recovery Drill, DR Orchestration & Automation
  • Ransomware Recovery Runbook & Decision Tree

Cross-Cutting Analysis

Coverage Notes

  • Physical security (facilities, access control, environmental) is not modelled as a standalone capability area. Physical controls appear as implementation details within CA-06 (OT isolation) and CA-05 (hardware root of trust).
  • Privacy is embedded across CA-01 (regulatory compliance), CA-08 (data protection), and CA-10 (responsible AI) rather than isolated as a separate domain. A dedicated privacy capability area may be warranted as regulations expand.
  • Blockchain and DLT security (SP-051 to SP-054) is not yet mapped into the capability model. These patterns post-date the current model version and will be integrated in a future revision.

What is a Capability Model?

A capability model describes what an organisation must be able to do — independent of the technologies, products, or controls used to do it. Each named capability is an organisational ability: a persistent competence that can be built, measured, and matured over time.

Capabilities are intentionally business-readable. They do not prescribe tooling or implementation choices; they describe outcomes. This makes them stable across technology generations and useful at every level of the organisation — from board-level risk conversations to architectural procurement decisions.

How It Relates to a Control Framework

The two are complementary but distinct. A capability model defines the functional abilities the organisation must possess — what must we be able to do? A control framework defines the specific safeguards — what must we put in place?

Step Question Example
The capabilityWhat must the organisation be able to do?Identity Lifecycle Management
The controlWhat safeguard is required within it?NIST AC-2: Manage accounts
The technologyWhat category of tool delivers it?Identity Governance platform
The productWhat do you buy or build?Okta, SailPoint, Azure AD

Design Alignments

Input Contribution
NIST SP 800-207 / CISA ZTA pillarsDefines what must be secured — six ZTA pillars plus Visibility & Analytics and Automation & Orchestration
NIST CSF 2.0Defines how security operates as a lifecycle — Govern, Identify, Protect, Detect, Respond, Recover
OSA pattern catalogueGrounds each capability in proven, implementable patterns — the implementation evidence base

Layer Definitions

Each capability area contains two levels of named capability, mirroring SABSA's top two conceptual tiers. A third layer (L3 — logical services and tools) is deferred to the OSA pattern catalogue.

Layer SABSA Equivalent Role Count
L1 — StrategicContextual (Business)Named business capability — what the organisation must be able to do3–4 per CA
L2 — ArchitecturalConceptual (Architect)Named sub-capability — the logical domain through which L1 is realised2–6 per L1