Skip to main content

Maturity Levels in Detail

Understand the detailed criteria for each cybersecurity maturity level in Hyver.

Updated over 5 months ago

Overview

The maturity model in Hyver gives organizations a structured way to evaluate their cybersecurity posture. Each level (1–5) represents a stage of progression — from reactive and ad hoc to proactive and continuously improving. This article explains what each level means and offers real-world examples to guide your assessments.


Maturity Level Breakdown

Level 1: Initial

Description: No formal processes or assigned responsibilities exist.
Characteristics:

  • Ad hoc, reactive behavior

  • No awareness of security risks

  • Activities are uncoordinated

  • No accountability or governance

Example:
Subcategory ID.AM-1Physical devices and systems are inventoried

Assessment: No asset inventory is maintained.
Rating justification: No process exists. This is a Level 1 maturity.


Level 2: Developing

Description: Some processes or controls are in place, but they are inconsistent or incomplete.
Characteristics:

  • Initial efforts underway

  • Security needs recognized

  • Some ad hoc implementation

  • Formal process discussions may have started

Example:
Subcategory ID.AM-1

Assessment: Partial asset inventory exists, but coverage is limited.
Rating justification: Process is only partially implemented. This is a Level 2 maturity.


Level 3: Defined

Description: Policies and procedures are formalized, standardized, and implemented across the organization.
Characteristics:

  • Processes are documented and repeatable

  • Broader organizational understanding and participation

  • Proactive stance begins to emerge

  • Key technologies are in place

Example:
Subcategory ID.GV-1Information security policy is established

Assessment: Policy exists and is applied but not yet measured.
Rating justification: Defined but not monitored. This is a Level 3 maturity.


Level 4: Managed

Description: Processes are monitored, measured, and enforced. The organization uses data to evaluate effectiveness.
Characteristics:

  • Clear ownership of processes and outcomes

  • Metrics are used to guide improvements

  • Policies are actively enforced

  • Little to no security gaps remain


Level 5: Optimizing

Description: The organization focuses on continuous improvement, with systems designed for adaptability and resilience.
Characteristics:

  • Strong feedback loops and learning culture

  • Flexibility to respond to evolving risks

  • Comprehensive coverage of controls

  • Strategic focus on refining what’s already working


Example: Choosing a Level Thoughtfully

Subcategory PR.AT-1All users are informed and trained
Before selecting a high maturity level, ask:

  • Is training policy-driven and enforced?

  • Is it run at regular, documented intervals?

  • Is someone responsible for oversight?

  • Is training effectiveness measured or reviewed?

These questions help avoid rating based on "task completion" alone. Mature cybersecurity isn’t just about doing — it’s about doing consistently, measurably, and with accountability.


Wrap-up / Next Steps

Use this detailed view of maturity levels to guide more accurate, defensible ratings across your assessment. The more nuance you bring to each score, the more powerful your maturity model becomes in shaping your security roadmap.

Did this answer your question?