<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>February</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Analysis and Study of a Cybersecurity Maturity Assessment System for SMEs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefano Bistarelli</string-name>
          <email>stefano.bistarelli@unipg.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sara Geoli</string-name>
          <email>sara.geoli@studenti.unipg.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chiara Luchini</string-name>
          <email>chiara.luchini@collaboratori.unipg.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Mercanti</string-name>
          <email>ivan.mercanti@unipg.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>SMEs, Cybersecurity Maturity Assessment, Web-based Tool</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Università degli Studi di Firenze</institution>
          ,
          <addr-line>Firenze</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Università degli Studi di Perugia</institution>
          ,
          <addr-line>Perugia</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>3</fpage>
      <lpage>8</lpage>
      <abstract>
        <p>Small and Medium Enterprises (SMEs) are increasingly vulnerable to cyber threats due to limited resources and the absence of tailored cybersecurity frameworks, especially in Italy. This study presents the development of a Cybersecurity Maturity Assessment System designed specifically for SMEs, integrating updates from NIST Cybersecurity Framework (CSF) version 2.0 and the Italian National Framework for Cybersecurity and Data Protection. A refined Framework Core was developed by synthesizing elements from these frameworks, complemented by a simplified methodology derived from oficial national guidelines. A web-based Cybersecurity Assessment Tool was implemented to guide users through the evaluation process, facilitating the creation of Target and Current Profiles and generating comprehensive Cybersecurity Assessment Reports.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Cyber risk awareness is becoming a critical competence for the survival and growth of companies. Any
well-executed cyber attack can negatively afect company stakeholders’ reliability, revenues, and trust,
leading to financial losses and even legal and compliance risks. During the past five years (2019–2023),
the Internet Crime Complaint Center (IC3) has received an average of 758,000 cybercrime complaints
annually, reflecting a consistent upward trend. The volume of reported incidents peaked at 880,418 in
2023, resulting in an estimated global financial loss of $12.5 billion [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This steady increase highlights
the growing prevalence and impact of cybercrime worldwide.
      </p>
      <p>
        The vulnerability to cyber threats does not depend on the size of the company: both multinationals
and Small and Medium Enterprises (SMEs) are exposed to increasing risks. SMEs often do not have
the same resources as large companies and may find it more dificult to defend themselves adequately
against cyber attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In 2021, 37% of Italian SMEs experienced at least one cyber attack, about
ten percentage points higher than the European average [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The European Flash Eurobarometer [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
highlighted managerial hypocrisy, particularly in Italy, where 71% of corporate executives claim to be
aware of cybercrime dangers, yet only 15% provide proper training to their personnel. The tendency
is the same across all European countries. Developing a structured and systematic strategy for SMEs
managers is necessary to improve cyber risk management, which is currently ineficient, particularly in
Italy, which has the largest number of SMEs in Europe [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], making their protection fundamental as
they form the backbone of the country’s economic structure.
      </p>
      <p>
        This paper presents the development of a Cybersecurity Maturity Assessment System tailored for
SMEs. We begin by comparing the Italian National Framework for Cybersecurity and Data Protection
(which we will call INFS)[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] written by the Research Center of Cyber Intelligence and Information
Security at Sapienza University of Rome (CIS) and the National Interuniversity Consortium for
Informatics (CINI), based on the NIST Cybersecurity Framework (CSF)[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], with the most recent version of
      </p>
      <p>CEUR</p>
      <p>
        ceur-ws.org
the NIST CSF [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], released in February 2024. In Section 2, we address the main diferences between the
two frameworks and outline the National Methodology. Then follow Section 3 with the description of
how the INFS can be enhanced by integrating significant updates from the NIST CSF version 2.0. Also,
we focus on the methodological adjustments needed to adapt the scoring and maturity metrics ofered
by CIS and CINI [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], ensuring they are more accessible and practical for SMEs. Next, in Section 4, we
describe the development of our Cybersecurity Assessment Tool designed to facilitate the adoption of
the Assessment System. Furthermore, in Section 6, we analyze the current state of the art, highlighting
existing approaches and emphasizing the significance of our contribution to cybersecurity maturity
assessment for SMEs. Finally, in Section 7, we present our conclusions, summarizing key findings and
outlining potential directions for future research.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background on the two Frameworks and the Methodology</title>
      <p>
        This section provides an overview of the key elements inherited by INFS from CSF, with a focus on the
elements added in the Italian Framework and the National Methodology, which ofers organizations
a path to follow when applying the Framework to their “context and measure their cybersecurity
posture” [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Then, we explain the main updates introduced in the most recent version of the NIST
elaborated.
      </p>
      <p>
        The INFS was published in 2015 by CIS and CINI [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], based on the 1.0 version of the CSF [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], which
main goal was to protect critical infrastructure by providing a common organizational structure for
diferent approaches to cybersecurity. To suit Italy’s SME-driven economy, CSF v1.0 was readapted.
Following the publication in 2018 of version 1.1 of the NIST Framework [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the adoption of the General
Data Protection Regulation (GDPR) in the Europan field, and the profound changes in the National
cybersecurity landscape, the CIS updated the Framework to version 2.0 in 2019, renaming it National
Framework for Cybersecurity and Data Protection [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Adapting and reprocessing the US Framework
on national territory initiates an international alignment of cyber threat responses and enterprise
cybersecurity management, allowing for an international cybersecurity dialogue [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>The three main concepts inherited from the CSF in the INFS are Framework Core, Framework Profiles
and Tiers, and are introduced the principles of Priority Levels, Maturity Levels and Contextualization.</p>
      <p>
        The Framework Core includes industry standards, principles, and practices that help the organization
to communicate cybersecurity eforts and results more efectively. It consists of five “concurrent and
continuous” [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] functions: Identify, Protect, Detect, Respond and Recover. In a sequential view, the
functions represent the life cycle of the organization’s cyber risk management, from identifying critical
assets and defining protective actions to implementing measures to detect, respond, and recover in the
event of a cyber attack. Each function is organized hierarchically into Categories and Subcategories,
with Informative References to guidelines, standards, GDPR legislation, and so on. The NIST defines
Tiers that provide insight into the extent to which IT risk management processes are embedded within
the organization. They are not maturity levels but inform risk management decisions, with four
assessment levels: Partial, Informed, Repeatable, and Adaptive. More information on the Tiers levels
can be found in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Through the opportune selection of specific Subcategories from the Framework
Core, organizations can create two Profiles tailored to their environment, applicability, and resources.
The Current Profile includes all of the cybersecurity outcomes gathered to date, whereas the Target
Profile comprises all desired goals. Comparing the obtained profiles may reveal a gap that has to be
closed by developing a road map to follow.
      </p>
      <p>
        One of the key elements introduced in the Italian Framework is the Priority Levels, which help
enterprises prioritize interventions to bridge the gap between the Current Profile and Target Profile,
focusing on the most risk-reducing measures. The goal is to identify essential Subcategories for
immediate implementation based on risk mitigation (threat exposure, occurrence probability, and
damage impact), costs, and measurable outcomes. The INFS defines three Priority Levels: Low, Medium,
and High. A High value is assigned when implementing a Subcategory substantially reduces a cyber
risk factor, regardless of cost. A Medium value indicates relatively low-cost risk reduction, while a
Low value applies when the cost is high and risk reduction is minimal. Since CSF Tiers are merely
“visionary tools” [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to help organizations understand cybersecurity risk management, the CSF does
not ofer mechanisms to measure implementation progress or improvements. To address this, the INFS
introduces Maturity Levels, enabling organizations to globally evaluate security processes, technological
implementations, and resource needs for each Subcategory. These levels must be incremental, and each
SME defines them according to its requirements. The INFS also introduces Contextualizations, allowing
Framework modulation based on sector, employee type, and territorial distribution. Contextualizations
are created by selecting Subcategories from the Framework Core to form a new enterprise core. Each
element of this core is then assigned a Priority Level and a Maturity Level. The 2015 [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and 2019 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
versions presented two contextualizations—one for Italian SMEs and one based on GDPR—which we
will integrate into our Cybersecurity Assessment Tool.
      </p>
      <p>
        To facilitate the adoption of the Framework and assess the extent to which current security measures
meet the desired objectives, a National Methodology [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] was published in 2021. It defines three
operational phases: Contextualization, Measure, and Evaluation, introducing the metrics of Score and
Maturity. The initial phase of Contextualization consists in the selection of specific Subcategories with
the corresponding level of Priority and Maturity, defining the new enterprise core. Contextualization
prototypes can be used to facilitate and speed up the step. This selective process produces the desired
Target Profile and establishes the foundation for the assessment. The consequent Measure phase
analyzes the gap between the just-created Target Profile and the Current Profile defined through the
administration of customized questionnaires by interviewers to SME’s selected employees. The final
phase of Evaluation, relying on the results of the precedent phase, evaluates the two profiles’ distance
from one another using the metrics of Score and Maturity. To understand the metrics, we first need
to explain what a scope is. A scope is defined as a set  = (,  )
, where  is the collection of relevant
assessment elements and  is a matrix assigning relevance values   in [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] to each control in the
Target Profile. The Score indicates the degree of implementation of an element in  , ranging from 0 to
1. It is calculated by comparing the implementation level (coverage value in [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ]) of each control in the
Current Profile with the Target Profile, weighted by the

matrix. The Maturity metric is expressed as
at maturity level  (ranging from 0 to 5, based on the CMMI scale1), weighted by the 
a five-element vector   , where each component   [] reflects the proportion of controls implemented
matrix. Each
vector value is derived from the maturity level of each control within the Subcategory. Further details
are available in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        The NIST Framework 2.0, published in February 2024, has expanded its focus beyond critical
infrastructures to include organizations of all sizes and sectors [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The Framework aims to “enhance
risk management by providing a flexible, comprehensive framework for organizations to strengthen
their cybersecurity posture and adapt to evolving threats”[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To achieve this, NIST CSF 2.0 provides
additional support through references to other frameworks [
        <xref ref-type="bibr" rid="ref13">13, 14</xref>
        ], online resources [15, 16, 17], useful
implementation examples [18] and the Cybersecurity and Privacy Reference Tool (CPRT) [19], which
acts as a centralized repository for managing datasets related to guidelines, standards, and informative
references. In earlier versions, the five Functions segmented cyber risk management temporally: before
(Identify and Protect), during (Detect), and after (Respond and Recover) [ 20]. However, with the addition
of the new central Govern function, each element is now integrated and interconnected, emphasizing a
unified and coordinated approach to cybersecurity risk management.
      </p>
      <p>
        Governance in NIST CSF 2.0 aligns cybersecurity with organizational goals, focusing on strategic
oversight, roles, policies, and accountability. This elevates cybersecurity as a critical business risk,
engaging executive leadership and embedding decision-making within risk management strategies [21,
22]. The Govern function introduces ten Subcategories for supply chain risk management (SCRM ) to
address complex third-party ecosystems. These Subcategories promote supplier security standards and
continuous monitoring, fostering resilience and proactive collaboration with supply partners [
        <xref ref-type="bibr" rid="ref7">7, 23</xref>
        ].
1CMMI: https://cmmiinstitute.com/learning/appraisals/levels.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Our Cybersecurity Maturity Assessment System</title>
      <p>
        Now, we present our Cybersecurity Maturity Assessment System, a reinterpretation of the phases of
the National Methodology [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] that adapts its metrics. This system is built upon our newly developed
Framework Core. To develop our system we revised the phases of Contextualization, Measure and
Evaluation in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        In the initial Contextualization phase of the original Methodology, organizations are permitted to
define their own Priority and Maturity Levels. However, these are predetermined to ensure a consistent
and robust framework, enabling meaningful comparisons among diferent SMEs that apply the same
contextualization. In this phase, a set of Subcategories must be selected, along with each level of Priority
and Maturity to create the Target Profile. Three are the possible Priority Levels: Low, Medium and
High, according to what is defined in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]; while the Maturity Levels are five: Initial, Repeatable, Defined,
Managed and Optimised, like the ones exposed as example in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The subsequent Metrics phase generates the Current Profile. To have a more automated, concise,
and streamlined process for defining the Profile in question, instead of creating and administering a
customized questionnaire to the company’s employees (like in the oficial Methodology), we assess the
Coverage Grade and Maturity Level of each control through the compilation of a form. The Coverage
Grade is determined by selecting a value between 0 and 1, while the Maturity Level is chosen from
a range of 0 to 5, following the previously defined scales. The selection must be done by minimum
competing selected employees in cybersecurity matters.</p>
      <p>Finally, the metrics of Score and Maturity calculated in the third and last phase of Evaluation are
reformulated according to the redefinition of scope, to grant a more general and linear approach. These
metrics are essential to the organization to obtain a quantitative analysis on their cyber risk management
based on the goal defined in the Target Profile. The element
 and  in the scope  = (,  )
, are
redefined as follows.</p>
      <p>• The set of components in  matches in each assessment all of the controls contained in the
contextualization  generated during the initial Contextualization phase. The set  has cardinality
1, as it contains only one element ( ) that represents all  controls in the contextualization  .
• The weight assigned to each control in the scope (equal to all those contained in contextualization
 ) is uniform, i.e. 1. As a result, the weight matrix W has a value of one at each position   . The
matrix  assumes a vector form, with each member   having a value of 1.</p>
      <p>Therefore, in Equation 1 can be seen the updated metric of Score where   is the Current Coverage of
the  -th control in the Current Profile, 
and  is the total number of controls in the contextualization.</p>
      <p>is the desired Coverage of the  -th control in the Target Profile</p>
      <p>While in Equation 2 is reported the Maturity metric where   () represents the set of controls in the
Target Profile to which have been assigned a Maturity Level in the Current Profile.</p>
      <p>() =</p>
      <p>∑=1 (</p>
      <p>/  )


  [] =
∑∈  () 1</p>
      <p>The final evaluation, using the indicated metrics and a broader scope, ofers a comprehensive
assessment for SMEs using the Framework. It compares the organization’s IT security posture to the
Target Profile without requiring detailed or excessive specialized knowledge. Closing the gap between
the Current and Target Profiles simply involves assessing the actions taken and, if necessary, redefining
them. Thus, the revised Methodology shown in Figure 1 provides a more extensive yet equally efective
approach, giving the organization a clear view of its cyber threat management.</p>
      <p>
        Aligning the Italian Framework Core with the key updates in CSF v.2.0 is indispensable, especially
given the expanded emphasis on governance and the increased focus on securing the supply chain. Our
(1)
(2)
new Framework Core has six Functions: Govern and Identify from the NIST Core and Protect, Detect,
Respond and Recover from the Italian one. Therefore, it is an aggregate (with appropriate adjustment)
of the following elements:
• The Italian Framework Core exposed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
• The new function Govern (GV) added in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the relative amendments of the function Identify
(ID).
      </p>
      <p>• The implementation examples [18] provided with the CSF updates.</p>
      <p>It is worth noting that changes were also made to the other Functions in the CSF v.2.0. However, we
deemed them minor, and it was considered essential to avoid extensive modifications to the National
Core Framework, as it had been specifically tailored to the Italian socio-cultural context by expert
institutions.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Our Cybersecurity Assessment Tool</title>
      <p>To facilitate the use of our Cybersecurity Maturity Assessment System, we developed a user-friendly
web application, referred to as the Cybersecurity Assessment Tool. This tool is designed to streamline
the assessment process, enabling users to evaluate their cybersecurity practices and determine their
maturity level eficiently. We implemented a RESTful application using Flask 2, a lightweight and flexible
Python 3 web framework. To manage the large volume of data associated with our new Framework Core,
the oficial ones and the contextualizations, we chose MariaDB 4 as the relational database management
system. The Tool requires registration to be used and handles two kinds of profiles: Administrator and
Base User.</p>
      <p>The Administrator must be a qualified individual capable of assessing the cybersecurity needs of the
SMEs they work with. After registering, the administrator gains access to a personal area where they
can perform various tasks, including: creating Base Users, viewing registered Base Users, developing
contextualizations from predefined prototypes or Framework Cores (either ours or oficial), compiling
them with Priority Levels, target Coverage Grades and target Maturity Levels generating the Target
Profile, and reviewing both the created contextualizations and the cybersecurity Assessment Reports
generated by each user.</p>
      <p>A Base User can only be registered in the Tool by an Administrator. Users can access the
contextualizations assigned by the administrator and individually complete each one, contributing to the
development of the relative Current Profile. These contextualizations can be modified or updated as
needed, ensuring the profile remains dynamic and accurate over time. Upon completion, users can view
the corresponding Cybersecurity Assessment Report to evaluate their cybersecurity posture. In case of
any issues or questions, users can access the informational references of the administrator who created
their profile.</p>
      <p>The contextualization page of our tool is shown in Figure 3. It features the same structure for both
the Administrator and Base User. However, the Administrator can select also the Priority Level, for
each Subcategory, in addition to the Coverage Grade and Maturity Levels. It is important to note
that the interface is currently in Italian; future enhancements should include an English option to
2Flask: https://flask.palletsprojects.com/en/3.0.x/
3Python: https://www.python.org/
4MariaDB: https://mariadb.org/</p>
      <p>Subcategory
PR.DS-2, Data
are protected
during transmission.
High
0.4 - Initial
4 - Managed
0.8 - Advanced
5 - Optimized
expand usability. Once the contextualization process is complete—the Target Profile is defined by the
Administrator and the Current Profile by the Base User—each included Subcategory adopts the structure
illustrated in Table 1. The table highlights how the Coverage Grade and Maturity Level apply to both
the Target and Current Profiles. These values are critical for calculating key metrics such as Score and
Maturity, which are presented in the final report. By analyzing these metrics, the gap between the
two profiles becomes evident, providing a clear understanding of the progression needed to align the
Current Profile with the Target objectives.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Cybersecurity Assessment Report</title>
      <p>The Cybersecurity Assessment Report is structured into three main sections. The first section focuses
on analyzing the Score. A table is presented, listing the Coverage Grade for each Subcategory within
both the Target and Current Profiles. To visually represent the percentage Score, a horizontal bar chart
is displayed, as shown in Figure 4. In the provided example, we observe that only 39.71% of the required
controls are currently implemented, as compared to the total objective defined in the Target Profile.
This indicates that less than half of the expected controls have been developed to date.</p>
      <p>The following section of the report presents the calculated Maturity. As in the previous section, it
includes a summary table of the Maturity values for each Subcategory in both the Current and Target
Profiles within the contextualization. Two separate tables are provided—one for the Current Profile and
one for the Target Profile—along with their corresponding column charts (see Figure 5). The Maturity
percentage values, as illustrated in Figure 6, show that the majority of controls (93.38%) are currently
implemented with a Maturity Level of 3 - Defined (Figure 6a). However, the objective is to achieve a 5
Optimised level for 97.79% of controls (Figure 6b). To identify which controls require more immediate
attention, a table has also been included that ranks the Subcategories by Priority Level.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Related Work</title>
      <p>A range of cybersecurity assessment models have been developed to strengthen organizations’ ability
to measure their cybersecurity maturity. These models typically adapt established frameworks, such as
the NIST Cybersecurity Framework (CSF), to meet the specific requirements of SMEs.</p>
      <p>
        Indeed, the Information Security Maturity Model (ISMM) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] proposes a mechanism to track the
implementation of NIST CSF using a five-level maturity scale across 23 assessed areas. While ISMM
improves on NIST’s Tiers, it is not designed specifically for SMEs and lacks a tool for accessible
implementation, limiting its practical use in resource-constrained environments. In contrast, the Methodology
we proposed is easily accessible through the Cybersecurity Assessment Tool, encouraging even the
most time-poor managers to adopt our Maturity Assessment System. Another notable contribution is
the Risk Management Framework for SMEs presented by Nasir et al. [29]. This framework integrates a
lightweight approach to risk management, emphasizing practicality and cost-efectiveness, essencial for
SMEs with limited resources. However, it does not directly incorporate the latest updates from the NIST
CSF, making it less aligned with evolving international standards. In our System, contextualization can
be created from various Framework Cores, included the created one based on the NIST updates and the
National Framework.
      </p>
      <p>Additionally, numerous cybersecurity tools have been introduced to assist SMEs in evaluating and
improving their security protocols, streamlining the assessment process and ensuring eficiency for
organizations with limited resources. For instance, the Cybersecurity Evaluation Tool (CET) [30]
simplifies cybersecurity assessment for SMEs by evaluating only 35 of the 96 NIST CSF controls.
It produces a report card with recommendations when gaps are detected. Although CET is
userfriendly, it lacks the flexibility to customize assessments based on the unique needs of individual SMEs,
as it uses a static subset of controls for all users. Indeed, to accommodate a broader audience and
guarantee a high degree of applicability, diferent contextualization prototypes are available in our Tool.
Furthermore, Armenia et al. [31] make a significant additional contribution by addressing the dynamic
nature of cybersecurity risks with the introduction of the SME Cyber Risk Assessment (SMECRA) tool.
SMECRA identifies an organization’s evolving cybersecurity risk profile, ofering continuous evaluation
and enabling SMEs to adjust their cybersecurity strategies dynamically. This approach emphasizes
adaptability, which is essential for organizations facing ever-changing threats. However, as highlighted
in the work of Nasir et al. [29], SMECRA does not integrate the latest updates to the CSF, making it less
aligned with the current version of the framework.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>
        This study presents the development of a Cybersecurity Maturity Assessment System designed to
meet the specific needs of SMEs. By synthesizing key components from the INFS, the CSF versions 1.1
and 2.0, and the National Methodology [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">5, 6, 7, 8</xref>
        ], a refined Framework Core was constructed. This
core integrates updates introduced in NIST CSF 2.0 (February 2024) and adapts them to the national
context, addressing the gap created by the delayed update of the National Framework. The revised
Score and Maturity metrics ofer a comprehensive and comparable approach to evaluating cybersecurity
risk management practices in SMEs over time. The development of the Cybersecurity Assessment
Tool provides a user-friendly interface that guides users through main stages of cybersecurity risk
management. The tool facilitates the definition of a Target Profile by expert administrators, the
completion of a Current Profile by designated users, and the generation of a Cybersecurity Assessment
Report. This report plays a central role in determining the necessary measures to enhance cybersecurity,
assess existing controls, and evaluate progress toward achieving cybersecurity objectives.
      </p>
      <p>Future improvements could focus on expanding the integration of updates to encompass additional
Subcategories of the NIST Cybersecurity Framework (CSF) beyond the Identify function. Refining
the assessment process by developing a customized questionnaire could enhance the precision of
coverage and maturity evaluations. Furthermore, automating the response analysis and incorporating a
messaging feature to facilitate communication between administrators and users could significantly
enhance the tool’s usability and overall efectiveness.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>The authors are member of the INdAM Research group GNCS and of Consorzio CINI. This work has
been partially supported by:
• GNCS-INdAM, CUP_E53C23001670001;
• MUR project PRIN 2022TXPK39 - PNRR M4.C2.1.1. “Empowering Public Interest Communication
with Argumentation (EPICA)’’ CUP H53D23003660006, funded by the European Union - Next
Generation EU, Missione 4 Componente 1;
• MUR PNRR project SERICS (PE00000014), funded by the European Union – Next Generation EU;
• EU MUR PNRR project VITALITY (J97G22000170005), funded by the European Union – Next</p>
      <p>Generation EU;
• University of Perugia - Fondo Ricerca di Ateneo (2020, 2022) – Projects FICO,</p>
      <p>BLOCKCHAIN4FOODCHAIN, RATIONALISTS, “Civil Safety and Security for Society’’;
• Piano Sviluppo e Coesione Salute PSC 2014-2020 - Project I83C22001350001 LIFE: “the itaLian
system wIde Frailty nEtwork’’ Linea di azione 2.1 “Creazione di una rete nazionale per le malattie
ad alto impatto’’ - Traiettoria 2 “E-Health, diagnostica avanzata, medical devices e mini invasività’’
Codice locale progetto T2-AN-12 CUP J93C22001080001.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used ChatGPT and Grammarly in order to: Grammar
and spelling check, Text Translation, Paraphrase and reword and Citation management. After using
these tools/services, the authors reviewed and edited the content as needed and take full responsibility
for the publication’s content.
Improving Privacy through Enterprise Risk Management, Technical Report, National
Institute of Standards and Technology, 2020. URL: https://doi.org/10.6028/NIST.CSWP.01162020.
doi:10.6028/NIST.CSWP.01162020.
[14] National Institute of Standards and Technology, Integrating Cybersecurity and Enterprise Risk
Management (ERM) (NIST IR 8286), Technical Report, U.S. Department of Commerce, 2020. URL:
https://doi.org/10.6028/NIST.IR.8286. doi:10.6028/NIST.IR.8286.
[15] NIST, Quick Start Guides for the NIST Cybersecurity Framework, 2023. URL: https://www.nist.</p>
      <p>gov/quick-start-guides.
[16] National Institute of Standards and Technology (NIST), CSF 2.0 Informative References, 2023. URL:
https://www.nist.gov/informative-references.
[17] National Institute of Standards and Technology (NIST), CSF 2.0 Profiles, 2023. URL: https://www.</p>
      <p>nist.gov/profiles-0.
[18] National Institute of Standards and Technology, CSF 2.0 Implementations Examples, Technical
Report, National Institute of Standards and Technology, 2024. URL: https://www.nist.gov/document/
csf-20-implementations-pdf.
[19] National Institute of Standards and Technology (NIST), Cybersecurity and Privacy Reference Tool
(CPRT), 2024. URL: https://csrc.nist.gov/projects/cprt.
[20] Cybersecurity360, NIST Cybersecurity Framework 2.0: Cambia lo standard della
cyber security, ecco come, 2024. URL: https://www.cybersecurity360.it/soluzioni-aziendali/
nist-cybersecurity-framework-2-0-cambia-lo-standard-della-cyber-security-ecco-come/.
[21] ISC2, 5 Things to Know Now about NIST CSF 2.0, 2024. URL: https://www.isc2.org.
[22] L. Security, NIST CSF 2.0: Key Updates and Their Impact, 2023. URL: https://lmgsecurity.com/
nist-csf-2-0.
[23] Nuspire, NIST CSF 2.0: Changes and Implications, 2023. URL: https://www.nuspire.com.
[24] S. Armenia, R. Baldoni, C. Biancotti, C. Carlini, F. d’Amore, L. Franchina, M. K. Mariam, L.
Montanari, L. Querzoni, L. Russo, F. Ruzzi, M. Spada, E. Spagnoli, A. Vitale, Controlli Essenziali di
Cybersecurity, Technical Report, CIS Sapienza, Laboratorio Nazionale di Cybersecurity, Consorzio
Interuniversitario Nazionale per l’Informatica (CINI), 2017. URL: https://www.cybersecurityframework.it/
sites/default/files/csr2016web.pdf.
[25] N. I. of Standards, T. (NIST), Small Business Cybersecurity Quick-Start Guide, NIST Special</p>
      <p>Publication, 2021. URL: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.02162023.pdf.
[26] Cybersecurity and Infrastructure Security Agency (CISA), Securing SMB Supply Chains: Resource
Handbook, U.S. Department of Homeland Security, 2023. URL: https://www.cisa.gov/sites/default/
files/2023-01/Securing-SMB-Supply-Chains_Resource-Handbook_508.pdf.
[27] Cybersecurity and Infrastructure Security Agency (CISA), Cyber Resilience Review (CRR), U.S.</p>
      <p>Department of Homeland Security, 2023. URL: https://www.cisa.gov/resources-tools/services/
cyber-resilience-review-crr.
[28] National Institute of Standards and Technology (NIST), Small Business Cybersecurity:
Online Training Resources, U.S. Department of Commerce, 2023. URL: https://www.nist.gov/itl/
smallbusinesscyber/training.
[29] A. Emer, M. Unterhofer, E. Rauch, A cybersecurity assessment model for small and medium-sized
enterprises, IEEE Engineering Management Review 49 (2021) 98–109. doi:10.1109/EMR.2021.
3078077.
[30] M. Benz, D. Chatterjee, Calculated risk? a cybersecurity evaluation tool for smes, Business Horizons
63 (2020) 531–540. URL: https://www.sciencedirect.com/science/article/pii/S0007681320300392.
doi:10.1016/j.bushor.2020.03.010.
[31] S. Armenia, M. Angelini, F. Nonino, G. Palombi, M. F. Schlitzer, A dynamic simulation approach to
support the evaluation of cyber risks and security investments in smes, Decision Support Systems
147 (2021) 113580. URL: https://www.sciencedirect.com/science/article/pii/S0167923621000907.
doi:10.1016/j.dss.2021.113580.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Internet</given-names>
            <surname>Crime Complaint Center</surname>
          </string-name>
          ,
          <source>Internet Crime Complaint Center Internet Crime Report</source>
          <year>2023</year>
          ,
          <string-name>
            <given-names>Technical</given-names>
            <surname>Report</surname>
          </string-name>
          , Federal Bureau of Investigation,
          <year>2023</year>
          . URL: https://www.ic3.gov/Media/PDF/ AnnualReport/2023_IC3Report.pdf.
          <source>doi:10.1234/ic3.2023.report.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <article-title>Why cybersecurity should be a top concern for middle-market companies</article-title>
          ,
          <source>SmallBizDaily</source>
          ,
          <year>2017</year>
          . URL: https://www.smallbizdaily.com/cybersecurity-middle
          <string-name>
            <surname>-</surname>
          </string-name>
          market-companies/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          ,
          <source>Flash Eurobarometer 496: SMEs and Cybercrime Report, Technical Report, European Commission</source>
          ,
          <year>2022</year>
          . URL: https://data.europa.eu/en/euridice/publications/ flash-eurobarometer-496
          <string-name>
            <surname>-</surname>
          </string-name>
          smes-and
          <string-name>
            <surname>-</surname>
          </string-name>
          cybercrime
          <source>-report. doi:10</source>
          .2837/14988.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Statista</surname>
          </string-name>
          , Number of SMEs in Europe by Country,
          <year>2023</year>
          . URL: https://www.statista.com/statistics/ 558308/smes-in
          <article-title>-europe-by-country/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ciccotelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Franchina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Spaccamela</surname>
          </string-name>
          , L. Querzoni,
          <article-title>Framework Nazionale per la CyberSecurity e la Data Protection, CIS Sapienza, Laboratorio Nazionale di Cybersecurity, Consorzio Interuniversitario Nazionale per l'Informatica (CINI</article-title>
          ),
          <year>2019</year>
          . URL: https://www. cybersecurityframework.it.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>N. I.</surname>
          </string-name>
          of Standards,
          <string-name>
            <surname>T.</surname>
          </string-name>
          (NIST),
          <source>Framework for Improving Critical Infrastructure Cybersecurity: Version 1</source>
          .1,
          <string-name>
            <surname>National</surname>
            <given-names>Institute</given-names>
          </string-name>
          <source>of Standards and Technology (NIST)</source>
          ,
          <year>2018</year>
          . URL: https://doi.org/10. 6028/NIST.CSWP.
          <volume>04162018</volume>
          . doi:
          <volume>10</volume>
          .6028/NIST.CSWP.
          <volume>04162018</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>National</given-names>
            <surname>Institute</surname>
          </string-name>
          of Standards and Technology,
          <source>The NIST Cybersecurity Framework (CSF) 2</source>
          .0,
          <string-name>
            <surname>National</surname>
            <given-names>Institute</given-names>
          </string-name>
          <source>of Standards and Technology</source>
          ,
          <year>2024</year>
          . URL: https://doi.org/10.6028/NIST.CSWP.
          <volume>29</volume>
          . doi:
          <volume>10</volume>
          .6028/NIST.CSWP.
          <volume>29</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bruttini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ciccotelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lucariello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Franchina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Querzoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ressa</surname>
          </string-name>
          ,
          <article-title>Metodologia per il cybersecurity assessment con il Framework Nazionale per la Cybersecurity e la Data Protection, CIS Sapienza, Laboratorio Nazionale di Cybersecurity, Consorzio Interuniversitario Nazionale per l'Informatica (CINI</article-title>
          ),
          <year>2019</year>
          . URL: https://www.cybersecurityframework.it/sites/default/files/ 2019-09/Metodologia_v1.0.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Montanari</surname>
          </string-name>
          ,
          <source>2015 Italian Cyber Security Report</source>
          , CIS Sapienza,
          <article-title>Laboratorio Nazionale di Cybersecurity, Consorzio Interuniversitario Nazionale per l'Informatica (CINI</article-title>
          ),
          <year>2016</year>
          . URL: https://www.cybersecurityframework.it.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>National Institute of Standards and Technology (NIST), Framework for Improving Critical Infrastructure Cybersecurity (Version 1</article-title>
          .0),
          <source>National Institute of Standards and Technology</source>
          ,
          <year>2014</year>
          . URL: http://www.nist.gov/cyberframework/.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Shackelford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Haut</surname>
          </string-name>
          ,
          <article-title>Bottoms up: A comparison of ”voluntary” cybersecurity frameworks</article-title>
          ,
          <source>UC Davis Business Law Journal</source>
          (
          <year>2015</year>
          ). URL: https://ssrn.com/abstract=2702039.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Almuhammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alsaleh</surname>
          </string-name>
          ,
          <article-title>Information security maturity model for nist cyber security framework</article-title>
          , in: International Conference on Industrial Technology,
          <year>2017</year>
          . URL: https://api. semanticscholar.org/CorpusID:51802617.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>National Institute of Standards and Technology, The NIST Privacy Framework: A Tool for</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>