BSIMM

← Back to glossary

What is BSIMM?

The Building Security In Maturity Model (BSIMM) is a framework that organizations use to measure, benchmark, and improve their software security initiatives. Rather than prescribing a single approach, BSIMM captures real-world data from hundreds of organizations to document what successful programs actually do in practice.

BSIMM helps application security leaders evaluate how their current activities compare with industry peers, identify maturity gaps, and plan the next phase of program development. For modern AppSec and DevSecOps teams, it provides a data-driven foundation for scaling secure-by-design principles across distributed development environments.

Core activities in the BSIMM framework

The BSIMM framework defines dozens of measurable activities across twelve security practices grouped into four domains: Governance, Intelligence, SSDL Touchpoints, and Deployment. 

Each activity represents a real practice observed within mature software security programs.

DomainExample activities
GovernanceEstablish executive sponsorship, track metrics, and manage policy.
IntelligenceCreate a knowledge base of threats, technologies, and frameworks.
SSDL TouchpointsEmbed security into design and code review processes.
DeploymentMonitor, test, and respond to issues in running applications.

Unlike prescriptive models, BSIMM captures what organizations actually do, not what they should do, providing a realistic baseline for growth.

How BSIMM assessments benchmark software security

A BSIMM assessment measures which activities an organization currently performs within each domain. The results are compared against the collective BSIMM dataset to determine maturity scores and percentile rankings.

The BSIMM maturity model explained

The BSIMM maturity model uses a staged approach that maps progress across the four core domains. Programs evolve from foundational activities (such as policy creation and developer training) to more advanced ones (like automated threat modeling or continuous assessments).

Maturity stageWhat it does
Level 1 – EmergingAd-hoc security activities with limited executive visibility.
Level 2 – DefinedStandardized security requirements integrated into development workflows.
Level 3 – MeasuredConsistent tracking of security metrics and ongoing process improvement.
Level 4 – OptimizedAdaptive, data-driven program with automation and enterprise-wide governance.

By aligning with this maturity model, teams can incrementally strengthen coverage across all BSIMM domains while reducing manual overhead and alert fatigue, two challenges highlighted in faster code, greater risks: the security trade-off of AI-driven development.

This benchmarking helps teams understand whether their security investments focus on high-value practices or lag behind industry peers. Integrating these insights with contextual platforms, such as application risk prioritization and remediation enables organizations to target resources where they’ll drive measurable risk reduction.

Because the BSIMM framework maps observed maturity across organizations, it’s especially valuable for large enterprises managing multiple product teams, each at different levels of AppSec maturity.

Mapping BSIMM to risk-based workflows

Once maturity gaps are identified, organizations can translate their BSIMM activities into specific, measurable workflows across the software development lifecycle. For example, BSIMM’s “policy and compliance management” activity can map directly to automated validation during CI/CD runs, while “threat modeling” can align with architectural review triggers for material code changes.

Integrating BSIMM into continuous security programs ensures that maturity improvements correspond to tangible risk reduction, not just procedural compliance. Correlating BSIMM findings with architecture drift detection or runtime context, allows security teams to connect program maturity directly with real-world impact.

This approach shifts BSIMM from being a static benchmarking exercise into a living framework that evolves alongside modern development practices. Over time, organizations can track whether specific activities—like automated risk assessments or dependency monitoring—actually lead to fewer incidents and faster remediation cycles.

Using BSIMM to improve application security programs

Organizations often use BSIMM to map their existing controls to the framework and identify gaps in coverage. This evaluation creates a roadmap for scaling maturity through specific BSIMM activities, such as expanding threat modeling, formalizing secure code training, or automating compliance evidence collection.

Apiiro’s dynamic application detection and response and code-to-runtime mapping capabilities complement BSIMM assessments by correlating architectural changes with measurable risk reduction. When combined, BSIMM benchmarking and automated visibility offer a continuous improvement cycle, turning maturity metrics into actionable outcomes.

Frequently asked questions

How does BSIMM differ from other software security frameworks?

BSIMM is observational, based on real organizational data, while others are prescriptive. It describes what mature programs do, not what they should do.

What types of organizations benefit most from a BSIMM assessment?

Large or rapidly scaling enterprises gain the most value, but any company seeking to benchmark and mature its AppSec practices can benefit.

How often should BSIMM benchmarking be performed?

Most organizations conduct an assessment annually to track progress and recalibrate security initiatives based on new data and business priorities.

Can BSIMM be adapted for agile or DevSecOps environments?

Yes. BSIMM’s activities are flexible and can align with agile ceremonies, CI/CD pipelines, and modern DevSecOps workflows without slowing development.

What are common challenges in implementing BSIMM activities?

Typical challenges include securing executive sponsorship, establishing consistent metrics, and scaling program maturity across distributed development teams.

← Back to glossary
See Apiiro in action
Meet with our team of application security experts and learn how Apiiro is transforming the way modern applications and software supply chains are secured. Supporting the world’s brightest application security and development teams: