CNAMM Framework
Cloud Native Assurance Maturity Model - a comprehensive framework for measuringand improving cloud native security posture across your organization.
Cloud Native Assurance Maturity
Model (CNAMM)
A comprehensive framework designed to help organizations measure and improve their Cloud Native security posture through structured evaluation of critical business functions and security controls.
CNAMM Maturity Scoring System
Organizations progress through four maturity levels, from Foundation (1.0) to Transformative (5.0)
Key Business Functions Evaluated
- Strategy and Risk Governance
- Identity and Access Governance
- Supply Chain and Vendor Security
- Runtime Security Operations
- Infrastructure and Platform Security
- Threat Detection and Response
- Application and Data Protection
- Resilience and Service Assurance
Comprehensive Visualization of Security Maturity
CNAMM provides weighted scores based on your organization's context, giving you a clear picture of where you stand and what steps to take next for improved cloud native security.
CNAMM Maturity Levels
The four stages of cloud native security maturity
Foundation
Basic security controls established with initial processes documented and limited automation implemented
- Manual security processes
- Reactive security posture
- Limited visibility into cloud assets
- Basic access controls
Standardized
Consistent security controls across environments with documented procedures and basic automation
- Documented security policies
- Security integrated into some processes
- Periodic security assessments
- Basic automated controls
Optimized
Comprehensive controls with integration, efficient processes and advanced automation capabilities
- Security as code practices
- Ongoing compliance monitoring
- Comprehensive threat detection
- Automated remediation
Leading
Industry-leading practices implemented with highly automated processes and innovative security measures
- Proactive threat hunting
- AI-driven security analysis
- Real-time risk modeling
- Automated compliance assurance
Transformative
Security drives business transformation with full automation, integration and continuous innovation
- Setting industry standards
- Continuous innovation
- Predictive compliance
- Security as business enabler
Key Business Functions
CyberScore was created to democratize security assessments for organizations
of all sizes
Strategy and Risk Governance
How security strategy aligns with business objectives and manages risk
Supply Chain and Vendor Security
Security practices for managing third-party dependencies and services
Infrastructure and Platform Security
Protection measures for cloud infrastructure, containers, and platforms
Application and Data Protection
Security controls for applications and sensitive data throughout the lifecycle
Identity and Access Governance
Management of identities, authentication, and authorization
Runtime Security Operations
Security monitoring and protection in production environments
Ways to Support Our Mission
Choose the support option that best aligns with your interests and capabilities
Financial Support
Donate to fund our mission of providing free cybersecurity education to everyone.
- One-time Donation
- Corporate Giving
Corporate Partnerships
Partner with us to boost your ESR efforts and support cybersecurity education.
- Sponsorship Opportunities
- Strategic Partnerships
In-Kind Support
Contribute tools, software, or services to support our educational programs.
- Software Donations
- Service Donations