Cookies Notice
This site uses cookies to deliver services and to analyze traffic.
đŁ Guardian Agent: Guard AI-generated code
The Building Security In Maturity Model (BSIMM) is a framework that organizations use to measure, benchmark, and improve their software security initiatives. Rather than prescribing a single approach, BSIMM captures real-world data from hundreds of organizations to document what successful programs actually do in practice.
BSIMM helps application security leaders evaluate how their current activities compare with industry peers, identify maturity gaps, and plan the next phase of program development. For modern AppSec and DevSecOps teams, it provides a data-driven foundation for scaling secure-by-design principles across distributed development environments.
The BSIMM framework defines dozens of measurable activities across twelve security practices grouped into four domains: Governance, Intelligence, SSDL Touchpoints, and Deployment.
Each activity represents a real practice observed within mature software security programs.
| Domain | Example activities |
| Governance | Establish executive sponsorship, track metrics, and manage policy. |
| Intelligence | Create a knowledge base of threats, technologies, and frameworks. |
| SSDL Touchpoints | Embed security into design and code review processes. |
| Deployment | Monitor, test, and respond to issues in running applications. |
Unlike prescriptive models, BSIMM captures what organizations actually do, not what they should do, providing a realistic baseline for growth.
A BSIMM assessment measures which activities an organization currently performs within each domain. The results are compared against the collective BSIMM dataset to determine maturity scores and percentile rankings.
The BSIMM maturity model uses a staged approach that maps progress across the four core domains. Programs evolve from foundational activities (such as policy creation and developer training) to more advanced ones (like automated threat modeling or continuous assessments).
| Maturity stage | What it does |
| Level 1 â Emerging | Ad-hoc security activities with limited executive visibility. |
| Level 2 â Defined | Standardized security requirements integrated into development workflows. |
| Level 3 â Measured | Consistent tracking of security metrics and ongoing process improvement. |
| Level 4 â Optimized | Adaptive, data-driven program with automation and enterprise-wide governance. |
By aligning with this maturity model, teams can incrementally strengthen coverage across all BSIMM domains while reducing manual overhead and alert fatigue, two challenges highlighted in faster code, greater risks: the security trade-off of AI-driven development.
This benchmarking helps teams understand whether their security investments focus on high-value practices or lag behind industry peers. Integrating these insights with contextual platforms, such as application risk prioritization and remediation enables organizations to target resources where theyâll drive measurable risk reduction.
Because the BSIMM framework maps observed maturity across organizations, itâs especially valuable for large enterprises managing multiple product teams, each at different levels of AppSec maturity.
Once maturity gaps are identified, organizations can translate their BSIMM activities into specific, measurable workflows across the software development lifecycle. For example, BSIMMâs âpolicy and compliance managementâ activity can map directly to automated validation during CI/CD runs, while âthreat modelingâ can align with architectural review triggers for material code changes.
Integrating BSIMM into continuous security programs ensures that maturity improvements correspond to tangible risk reduction, not just procedural compliance. Correlating BSIMM findings with architecture drift detection or runtime context, allows security teams to connect program maturity directly with real-world impact.
This approach shifts BSIMM from being a static benchmarking exercise into a living framework that evolves alongside modern development practices. Over time, organizations can track whether specific activitiesâlike automated risk assessments or dependency monitoringâactually lead to fewer incidents and faster remediation cycles.
Organizations often use BSIMM to map their existing controls to the framework and identify gaps in coverage. This evaluation creates a roadmap for scaling maturity through specific BSIMM activities, such as expanding threat modeling, formalizing secure code training, or automating compliance evidence collection.
Apiiroâs dynamic application detection and response and code-to-runtime mapping capabilities complement BSIMM assessments by correlating architectural changes with measurable risk reduction. When combined, BSIMM benchmarking and automated visibility offer a continuous improvement cycle, turning maturity metrics into actionable outcomes.
BSIMM is observational, based on real organizational data, while others are prescriptive. It describes what mature programs do, not what they should do.
Large or rapidly scaling enterprises gain the most value, but any company seeking to benchmark and mature its AppSec practices can benefit.
Most organizations conduct an assessment annually to track progress and recalibrate security initiatives based on new data and business priorities.
Yes. BSIMMâs activities are flexible and can align with agile ceremonies, CI/CD pipelines, and modern DevSecOps workflows without slowing development.
Typical challenges include securing executive sponsorship, establishing consistent metrics, and scaling program maturity across distributed development teams.