ESMA™
See exactly where you stand.
AiCyberWatch's proprietary security maturity assessment. Eight domains. Ninety-four controls. Five-level maturity scale. Two weeks from kickoff to executive readout. Tool-instrumented technical discovery paired with structured stakeholder interviews — every score backed by verifiable evidence, not self-reported questionnaire responses. The most rigorous, visually defensible maturity assessment a CISO can put in front of their board.
What ESMA Does
The clearest picture of your security posture you'll ever see.
Most security leaders know they have gaps. They cannot prove it. They cannot prioritise it. They cannot present it to a board in a form that drives investment. ESMA™ exists to solve that problem with executive-grade precision.
It is not a vulnerability scan. It is not a penetration test. It is not a compliance checklist. ESMA™ is a structured maturity assessment, eight domains, ninety-four controls, five-level scoring conducted by senior security consultants with operational experience defending enterprises across BFSI, Fintech, Healthcare, Manufacturing, Energy, and Government. Our assessors combine automated technical discovery passive network analysis, cloud configuration auditing, identity security assessment, application vulnerability scanning, encryption validation with structured stakeholder interviews across eight roles. Every score is backed by verifiable technical evidence, not self-reported questionnaire responses. The output is a visual, defensible, board-ready picture of where your security capability stands today and where it should land in twelve months.
Why CISOs Run It
Three triggers. Three deliverables. Three reasons.
Pre-Board Reporting
Maturity scorecard with 12-month delta
Replaces qualitative narratives with measurable progression — a metric the board can hold you to. Maturity progresses; absence-of-incidents does not.
Regulator Readiness
Heatmap and evidence pack mapped to DPDP / SEBI CSCRF / IEC 62443
Auditors recognise the structure. You walk into the audit room with the evidence already organised. No last-minute scramble.
Post-Incident Clarity
Domain-level findings with prioritised remediation roadmap
The first thing a board asks after an incident: "How did this happen and what else are we exposed to?" ESMA answers both — quickly, defensibly.
The Assessment
Eight domains. Ninety-four controls. One picture.
Every dimension of an enterprise security capability is assessed across eight domains, structured to mirror how modern security operations are actually run — and how regulators actually audit them. Each domain is scored on a five-level maturity scale and presented with a domain-level radar chart, a control-by-control heatmap, evidence-based findings, and prioritised recommendations.
How We Score
Five levels. One language your board will understand.
Every control is scored on a five-level maturity scale calibrated to NIST CSF tier definitions. The scale is deliberately structured so the same vocabulary works across technical reviewers, executive stakeholders, and external auditors. No translation required.
Ad-hoc. Controls exist informally if at all. No documentation. Outcomes depend on individual heroics.
Controls implemented but inconsistently. Documentation partial. Coverage gaps known but un-remediated.
Controls implemented consistently. Documentation complete. Coverage understood and gaps tracked.
Controls measured. Effectiveness tested. Outcomes correlated to business risk.
Controls continuously improved. Threat-informed. Predictive rather than reactive.
Standards & Methods
Built on the standards your auditors already trust.
The D³E methodology and the ESMA™ control framework are derived from globally recognised security standards and aligned to Indian regulatory regimes. Every score is anchored to a published reference your auditor, your regulator, and your board are reading the same vocabulary we are.
How we collect evidence
Evidence-based, not opinion-based.
ESMA™ is engineered as a tool-instrumented assessment. Senior consultants direct the engagement, but every control score is anchored to verifiable technical evidence collected through three converging tracks. Self-reported questionnaires alone are not accepted as evidence.
Automated technical discovery
Passive network analysis, cloud configuration auditing, identity security assessment, application vulnerability scanning, and encryption validation — run under formal scan authorisation across agreed scope.
Structured stakeholder interviews
Eight role-based interview tracks — CISO, CIO, network, identity, cloud, application, OT/operations, governance/DPO — using a standardised question bank calibrated to each domain.
Documentary & evidence review
Policy artefacts, console screenshots, configuration exports, audit reports, and operational telemetry — reviewed against the 94-control inventory before scores are calibrated.
Every score in your ESMA™ Scorecard is backed by verifiable technical evidence not what someone said in an interview, but what the tool, the configuration, or the artefact actually showed.
Deliverables
What you receive
Every ESMA™ engagement delivers five distinct artefacts, each designed for a different audience and a different conversation. No single document tries to be everything to everyone that is the point.
Security Posture Scorecard
A visual single-page summary: overall maturity score, domain-level radar chart with current and target overlays, top three strengths, top five gaps, and the maturity level achieved. Designed to be the first slide in your next board pack.
Security Posture Heatmap
A single-page colour-coded grid covering all 94 controls organised by domain, with maturity scoring rendered in the brand's red-amber-yellow-teal-gold gradient. The "one-glance" executive view, exactly where you stand on every control, in one image.
Written Assessment Report
A comprehensive report typically 35-50 pages, depending on environment complexity covering executive summary, methodology, overall posture, domain-by-domain findings, evidence reviewed, prioritised recommendations, and full appendices. Written to be readable by both technical and executive audiences.
12-Month Improvement Roadmap
Recommendations prioritised across four time horizons - Immediate (0-30 days), Short-term (1-3 months), Medium-term (3-6 months), Long-term (6-12 months) — with effort indicators, expected maturity uplift per recommendation, and dependencies mapped between actions.
Executive Presentation Deck
A 16-slide presentation deck designed for a 45-minute leadership readout. Co-branded for internal presentation, structured to walk a board through findings, recommendations, and roadmap without requiring the CISO to translate technical detail in real time. Includes speaker notes.
Engagement Timeline
How it runs. Two weeks. Six stages.
ESMA™ is engineered for executive-grade rigour at executive-grade speed. Fourteen working days is the standard delivery window, long enough for tool-instrumented technical discovery across every domain, short enough that your team's calendar absorbs it without disrupting business operations.
1–2
Kickoff & Scoping
Stakeholder alignment, scope confirmation, scan authorisation, CISO and CIO interviews.
3–5
Network · Endpoint · Identity
Technical discovery: network architecture review, endpoint posture, identity and access security assessment.
6–8
Cloud · Application · Data
Cloud configuration auditing, application vulnerability assessment, encryption and data protection validation.
9–10
OT/IoT & Governance
OT/IoT observation (where in scope), governance and policy review, remaining stakeholder interviews.
11–12
Scoring & Recommendations
Scoring calibration across assessors, evidence-weighted findings validation, prioritised recommendation development.
13–14
Deliverables & Readout
Scorecard, heatmap, written report, roadmap, and executive deck finalised. Internal QA. Leadership presentation.
Timeline shown is indicative for a standard engagement (14 working days). Actual duration may vary based on the size and complexity of the environment, number of sites, OT scope, and stakeholder availability.
Engagement Timeline
How it runs. Two weeks. Six stages.
ESMA™ is engineered for executive-grade rigour at executive-grade speed. Fourteen working days is the standard delivery window, long enough for tool-instrumented technical discovery across every domain, short enough that your team's calendar absorbs it without disrupting business operations.
1–2
Kickoff & Scoping
Stakeholder alignment, scope confirmation, scan authorisation, CISO and CIO interviews.
3–5
Network · Endpoint · Identity
Technical discovery: network architecture review, endpoint posture, identity and access security assessment.
6–8
Cloud · Application · Data
Cloud configuration auditing, application vulnerability assessment, encryption and data protection validation.
9–10
OT/IoT & Governance
OT/IoT observation (where in scope), governance and policy review, remaining stakeholder interviews.
11–12
Scoring & Recommendations
Scoring calibration across assessors, evidence-weighted findings validation, prioritised recommendation development.
13–14
Deliverables & Readout
Scorecard, heatmap, written report, roadmap, and executive deck finalised. Internal QA. Leadership presentation.
Timeline shown is indicative for a standard engagement (14 working days). Actual duration may vary based on the size and complexity of the environment, number of sites, OT scope, and stakeholder availability.
How It Fits
Standalone-valuable. Methodology-anchored.
ESMA is the first phase of the D³E methodology and a complete audit on its own.
Most clients first encounter ESMA as a standalone engagement. The board wants a maturity number. The auditors want evidence. The new CISO wants a 90-day baseline. ESMA delivers all three, with no methodology buy-in required and no commitment beyond the assessment itself. For organisations that want more than a snapshot, ESMA becomes the front door to the full D³E methodology — same scorecard, same gaps, same roadmap, all flowing into Design, Defend, and Evolve. Nothing is duplicated. Nothing is wasted.
ESMA Standalone
Independent maturity audit. Two weeks. Five deliverables. No methodology commitment.
Run it once, take the findings and roadmap, execute internally. Or use the deliverable to brief your existing security partner. Or run it annually as a board-level posture metric.
ESMA as D³E Phase 1
ESMA is the entry phase. Findings flow into Design, Defend, and Evolve as a continuous twelve-month engagement.
Same two-week assessment, but the deliverable becomes the architectural brief for your Defence Blueprint, the tuning input for your Managed SOC, and the year-zero baseline for annual progression.
Industry-Specific Fit
ESMA mapped to your sector and your regulators.
The eight domains and their underlying controls are calibrated against industry-specific risk profiles. The same ESMA assessment runs differently for a private bank than for an auto-component manufacturer — same framework, different weighting, different evidence requirements, different board-relevant findings.
| Sector | Regulatory anchor | Where ESMA places extra emphasis |
|---|---|---|
BFSI | SEBI CSCRF · RBI · DPDP | D3 Identity & Access · D4 Data Protection · D8 Governance — board-grade evidence pack. |
Fintech | RBI · DPDP · PCI-DSS | D5 Cloud Security · D6 Application Security · D3 Identity & Access — fast-moving stack. |
Healthcare | DPDP · HIPAA (cross-border) | D4 Data Protection · D7 OT/IoT (medical devices) · D2 Endpoint — patient-data primacy. |
Manufacturing | IEC 62443 · OEM questionnaires | D7 OT/IoT · D1 Network (IT/OT segmentation) · D6 Application — Purdue-aligned. |
Energy / Utilities | CEA Guidelines · IEC 62443 | D7 OT/IoT · D1 Network · D8 Governance — critical infrastructure framing. |
Government / PSU | CERT-In · Ministry directives | D8 Governance · D1 Network · D4 Data Protection — sovereignty-aware. |
Proof
Three engagements. Three industries. One methodology.
Anonymised illustrations actual maturity deltas measured via successive ESMA™ assessments across 9-to-12-month engagements.
~3,500 employees · 250+ branches
Trigger: SEBI CSCRF deadline + post-incident review. Largest moves: Identity & Access 1.8 → 4.1 (MFA + PAM), Cloud Security 1.5 → 3.4 (CSPM), Governance 2.5 → 4.0 (CSCRF readiness). MTTD dropped from 14 hours to 22 minutes.
Illustrative · Anonymised5 hospitals · 1,200 beds
Trigger: DPDP exposure + sector-wide ransomware pressure. Largest moves: Data Protection 1.6 → 3.5 (DPDP-aligned classification + DLP), OT/IoT 1.2 → 2.9 (medical-device segmentation), Endpoint 2.0 → 3.6 (EDR rollout). Two ransomware attempts blocked in Q2.
Illustrative · Anonymised8 plants · ~6,500 employees
Trigger: OEM customer cybersecurity questionnaire + IEC 62443 push. Largest moves: OT/IoT 1.4 → 3.2 (Purdue model), Network 1.9 → 3.6 (IT/OT segmentation), AppSec 1.7 → 3.1 (secure SDLC). IEC 62443 alignment achieved for L3.5 zones; two OEM audits cleared.
Illustrative · AnonymisedFAQ
Questions CISOs ask before running ESMA
How is ESMA different from a vulnerability assessment or penetration test?
Vulnerability assessments and penetration tests measure technical weakness they tell you which doors are unlocked. ESMA measures organisational capability — it tells you whether you have the locks, the guards, the alarms, the response procedures, and the governance to keep the building safe over time. The two are complementary, and most mature security programmes run both. ESMA, however, is the assessment a board-room conversation requires. A vulnerability scan is not.
What's the time commitment from our team?
Roughly 14 to 22 hours of stakeholder time, distributed across the two-week engagement. The CISO commits to a kickoff call (90 minutes), a closing readout (45–60 minutes), and is interviewed for approximately 90 minutes. Other stakeholders — network admin, cloud admin, application team lead, OT lead, DPO — contribute 60–90 minutes each. Document review and console walk-throughs are largely fulfilled in parallel by your team, requiring minimal disruption once access is granted. Most of the 14 days is our team's effort, not yours.
We already run ISO 27001 / NIST CSF assessments. Why ESMA?
ISO 27001 and NIST CSF are excellent frameworks, but they are reference architectures — they do not produce a visual maturity scorecard, a colour-coded heatmap, eight domain spider charts, and a prioritised twelve-month roadmap calibrated to your sector. ESMA is structured to crosswalk against ISO and NIST, so you do not lose existing investment. Most clients who already operate ISO or NIST find ESMA produces a sharper executive narrative — and a faster path to board-relevant decisions — than re-running the parent framework.
Is the assessment data confidential?
Yes, with three layers of protection. First, every engagement is governed by a mutual NDA executed before kickoff. Second, AiCyberWatch operates under ISO 27001 controls — your evidence is handled under the same regime that protects our other clients' data. Third, all assessment data is processed and stored on India-resident infrastructure in compliance with the DPDP Act.
Can ESMA help us prepare for a SEBI CSCRF or DPDP audit?
Yes — and many engagements are triggered exactly by that requirement. ESMA's domain structure was built specifically to produce evidence that maps cleanly to SEBI CSCRF's Identify-Protect-Detect-Respond-Recover lifecycle and to DPDP Act obligations on data fiduciaries. The deliverable pack typically contains audit-ready evidence: control-level scoring, documented findings, gap remediation roadmaps, and references to the source evidence reviewed.
What happens after the readout?
Three options. (1) You take the findings and roadmap and execute internally — that is a perfectly valid outcome and we will tell you so if it fits. (2) You bring AiCyberWatch back as advisor for prioritised remediation. (3) You move to the full D³E methodology, with ESMA becoming the formal Discover phase and the engagement extending into Design, Defend, and Evolve. The decision is taken at the readout — there is no commitment baked into the assessment itself.
Can ESMA be run remotely, or does it need on-site presence?
Most ESMA engagements run hybrid — interviews and console walk-throughs conducted remotely, with optional on-site days for OT environments, large multi-site enterprises, or clients who prefer face-to-face for the executive readout. We adapt to your operational preference.
How is this different from a free questionnaire-based assessment offered by other providers?
A questionnaire is a self-report. ESMA is an evidence-based assessment. We do not score what you tell us — we score what we can corroborate from your consoles, your documents, your interviews, and our own observation. That is why ESMA produces results an auditor, an insurer, or an acquiring entity can rely on. A questionnaire produces results only the questionnaire-writer believes.
Ready to See Where You Stand
Talk to us about ESMA™
Two weeks. Five deliverables. One picture of your security posture you can defend in any room.
Engagement scoping is free. We will walk you through what ESMA covers in your specific sector, what evidence we need, what your team needs to commit, and what timeline fits your audit calendar. No automated booking, no calendar trap just a 30-minute conversation with a senior security advisor who will tell you, honestly, whether ESMA is the right starting point for what you are trying to achieve.
Or call us directly — +91-8010101070 — Mon-Fri, 9 AM to 7 PM IST
ESMA – Maturity Assessment