Information Security 6 min read

Unlocking Organizational Security: New Identity Governance Maturity Model Standards

Amid growing organizational complexity and rising security incidents, the China Academy of Information and Communications Technology and leading enterprises have launched the Identity Governance Capability Maturity Model series standards—detailing evaluation frameworks, levels, and processes—to help organizations assess and improve identity governance, with open registration for 2024 assessments.

Efficient Ops
Efficient Ops
Efficient Ops
Unlocking Organizational Security: New Identity Governance Maturity Model Standards

As organizations expand and digital transformation deepens, identity governance faces numerous challenges, while frequent security incidents underscore the urgent need for clear identity permissions, access policies, and risk prediction.

Led by the China Academy of Information and Communications Technology (CAICT) together with major enterprises, the Identity Governance Capability Maturity Model series standards were created, comprising Part 1: General Capability Requirements and Part 2: System and Tool Technical Requirements.

Overview of Identity Governance Capability Maturity Model series standards
Overview of Identity Governance Capability Maturity Model series standards

Standard Evaluation Framework

Part 1 defines three major dimensions—access management, identity management, and general capabilities—covering nine sub‑dimensions and numerous items. The model grades maturity into five levels: Initial, Basic, Comprehensive, Excellent, and Outstanding, each with specific capability requirements.

Evaluation framework of Part 1
Evaluation framework of Part 1

Part 2 focuses on systems and tools, covering five dimensions—unified identity management, unified resource management, unified authentication management, development integration management, and unified security management—totaling sixteen sub‑dimensions and various functional items. Assessment results are categorized as Application, Comprehensive, and Outstanding levels.

Evaluation framework of Part 2
Evaluation framework of Part 2

Evaluation Value

The assessment, performed by an independent third‑party institution, promotes standard adoption, helps organizations understand their current state, and guides improvement, product development, and procurement decisions.

Value of the maturity model assessment
Value of the maturity model assessment

Evaluation Cases

Early evaluations have been completed by China Merchants Bank, China Minsheng Bank, and Beijing Steam Memory Technology Co., Ltd.

Evaluation Process

In 2024 the evaluation for both parts of the model is open for registration. Organizations can apply by emailing the contacts listed below.

Evaluation process diagram
Evaluation process diagram

Contact Information

CAICT – Sun Huan, Phone: 151 7234 2319, Email: [email protected]

CAICT – Jiang Jingjing, Phone: 178 8882 3510, Email: [email protected]

maturity modelaccess managementsecurity standardsevaluation processidentity governance
Efficient Ops
Written by

Efficient Ops

This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.