Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1064

SOC Maturity Model

What is SOC Maturity Model?

SOC Maturity ModelA framework that scores a Security Operations Center across people, process, technology, and services to guide a multi-year improvement roadmap.


SOC maturity models help organisations benchmark their detection-and-response capability against industry practice. The Hewlett Packard Enterprise 5-level model and the open SOC-CMM by Rob van Os are the most widely used; both score domains such as governance, intelligence, monitoring and detection, response, threat hunting, automation, and continuous improvement. Each domain is rated on a 0-to-5 scale (Initial, Basic, Defined, Managed, Optimised) using interviews, evidence reviews, and self-assessments. The output is a heatmap that identifies weakest areas and supports investment decisions, hiring plans, and tooling roadmaps. Maturity is not the same as effectiveness, so models are typically used alongside outcome metrics like dwell time and detection coverage.

Examples

  1. 01

    An HPE-style assessment scoring "Threat Hunting" at Level 2 (Basic) with a roadmap to Level 4.

  2. 02

    Using SOC-CMM to justify hiring two threat hunters and rolling out SOAR.

Frequently asked questions

What is SOC Maturity Model?

A framework that scores a Security Operations Center across people, process, technology, and services to guide a multi-year improvement roadmap. It belongs to the Defense & Operations category of cybersecurity.

What does SOC Maturity Model mean?

A framework that scores a Security Operations Center across people, process, technology, and services to guide a multi-year improvement roadmap.

How does SOC Maturity Model work?

SOC maturity models help organisations benchmark their detection-and-response capability against industry practice. The Hewlett Packard Enterprise 5-level model and the open SOC-CMM by Rob van Os are the most widely used; both score domains such as governance, intelligence, monitoring and detection, response, threat hunting, automation, and continuous improvement. Each domain is rated on a 0-to-5 scale (Initial, Basic, Defined, Managed, Optimised) using interviews, evidence reviews, and self-assessments. The output is a heatmap that identifies weakest areas and supports investment decisions, hiring plans, and tooling roadmaps. Maturity is not the same as effectiveness, so models are typically used alongside outcome metrics like dwell time and detection coverage.

How do you defend against SOC Maturity Model?

Defences for SOC Maturity Model typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SOC Maturity Model?

Common alternative names include: SOC-CMM, SOC capability maturity model.

Related terms