Vulnsy
Guide

ITIL Maturity Model: A Guide for Security Teams

By Luke Turvey13 May 202619 min read
ITIL Maturity Model: A Guide for Security Teams

A lot of pentest teams don't have a testing problem. They have an operations problem.

The testing itself is often good. The chaos shows up around it. One consultant names findings one way, another uses a different severity rationale, screenshots live in three places, evidence goes missing before final QA, and the report turns into a late-night Word surgery session. Meanwhile, clients ask sensible questions that are hard to answer quickly. Are we improving over time? Why did this fix take so long? Why does one report look polished and the next feel stitched together?

That's where the itil maturity model becomes useful for security teams. Not as ceremony. Not as a box-ticking exercise. As a way to make a pentest practice more predictable, easier to run, and easier to trust.

From Security Chaos to predictable Operations

A familiar week in a security consultancy looks like this. On Monday, a tester starts an external assessment with a rough scope agreed in email. By Wednesday, a client adds assets. On Thursday, the delivery lead realises the reporting template is outdated. By Friday, the team is chasing screenshots, rewriting finding titles, and arguing about whether a weak TLS configuration belongs under one library entry or three.

Nothing in that story is unusual. That's the problem.

Security teams usually feel the pain in four places:

  • Scoping drifts because requests arrive through chat, email, calls, and ticket systems with no single workflow.
  • Testing quality varies because methodology lives in people's heads instead of a repeatable operating model.
  • Reporting slows delivery because evidence handling, wording, formatting, and review aren't standardised.
  • Improvement never sticks because every post-project lesson gets buried under the next urgent engagement.

The result is a team that works hard but still looks inconsistent. Clients experience that inconsistency as risk. Managers experience it as resourcing pressure. Testers experience it as rework.

Why this isn't just a documentation issue

Organizations often first try to solve this with templates alone. Templates help, but they don't fix ownership, handoffs, approval paths, or follow-up. A polished report generated from a messy process still comes from a messy process.

The practical value of the itil maturity model is that it gives security leaders a way to look beyond isolated symptoms. Instead of asking, “How do we write reports faster?”, it asks, “How does our service operate from request to remediation?”

Practical rule: If your team depends on heroics to deliver a clean report on time, your process isn't mature. It's fragile.

That same thinking is why service management teams have spent time on workflow discipline and request handling. If you want a useful parallel from the ITSM side, the ideas in improving efficiency through AI service desks are worth reading because they show how structured intake and triage reduce noise before work even starts.

What mature security operations actually feel like

A mature team doesn't become bureaucratic. It becomes calmer.

Scoping is clearer. Evidence is captured in a consistent way. Findings are easier to compare across clients. Review cycles shorten because the team agrees on what “good” looks like. Vulnerability follow-up becomes more reliable because ownership and change paths are clearer.

That's the shift. Less chaos, fewer avoidable delays, better reports, and a stronger case that your security function creates real operational value.

Understanding the ITIL 4 Maturity Model

The easiest way to understand the itil maturity model is to stop thinking about frameworks and start thinking about craft.

An apprentice can produce decent work on a good day with close supervision. A master can produce reliable work, train others, adapt to unusual situations, and improve the workshop itself. Organisations mature in much the same way. Early-stage teams can deliver results, but only when the right people are available and the conditions are favourable. Mature teams deliver more consistently because their way of working is designed, measured, and improved.

The ITIL Maturity Model was officially introduced by AXELOS in 2019 as part of the ITIL 4 framework. It was developed in the UK to standardise IT service management assessments, building on UK government-led ITIL development since the late 1980s. By 2020, over 70% of UK FTSE 100 companies had adopted ITIL practices, with the model supporting more objective benchmarking, as noted in this overview of the ITIL maturity model.

An infographic titled Understanding the ITIL 4 Maturity Model displaying four stages of organizational service management.

The Service Value System in security terms

ITIL 4 centres on the Service Value System, often shortened to SVS. That sounds abstract until you translate it into operational reality.

For a security team, the SVS is the full system that turns a client request or internal need into a usable outcome. It includes how work is accepted, prioritised, performed, reviewed, delivered, and improved afterwards. In pentesting terms, that might cover intake, scoping, scheduling, testing, evidence capture, report production, remediation support, and lessons learned.

If one part is weak, the whole service feels weak. Strong testing won't compensate for poor change control. Clean reporting won't save a badly governed escalation path.

The four dimensions that stop teams from over-focusing on tools

A lot of security teams over-invest in one dimension and neglect the others. They buy platforms and scanners, then wonder why delivery still feels messy. ITIL's four dimensions help prevent that.

  • Organisations and People
    This is about roles, accountability, skills, and team habits. If nobody owns QA standards, report consistency won't improve.

  • Information and Technology
    These are the systems, templates, evidence stores, ticketing links, and reporting platforms that support delivery.

  • Partners and Suppliers
    Most security teams rely on clients, cloud providers, ticketing systems, contractors, or external remediation partners. Those dependencies shape delivery quality.

  • Value Streams and Processes
    This is the route work takes from request to outcome. If that route is unclear, delays become normal.

Why this matters more than a maturity score

The model is useful because it reveals where performance is breaking down. A team can look busy and still be immature. It can have strong testers and weak service design. It can also have decent tooling and poor governance.

If you're trying to connect ITIL thinking to adjacent frameworks, this explanation of modernizing ITSM is useful because it focuses on practical operating changes rather than jargon. For a security-specific comparison, this capability maturity model guide is also a helpful reference point because capability and maturity often get mixed up when teams assess themselves.

Mature teams don't just do good work. They make good work repeatable.

Decoding the Five Levels of ITIL Maturity

The five levels are easier to use when you treat them as behavioural states, not labels. Most security teams don't sit neatly in one box anyway. They may run testing at one level, reporting at another, and remediation support at a third.

A 2023 UK Government Digital Service report found that 82% of UK central government departments using the model reached at least Maturity Level 2, and that this correlated with a 28% reduction in service downtime incidents compared with non-assessed peers. The same source notes that London-based financial services firms averaged Level 3.5, with 22% higher customer satisfaction scores in BSI UK audits, as summarised in this review of ITIL maturity levels and assessments.

A diagram illustrating the five levels of ITIL maturity from initial reactive processes to optimizing and innovation.

Level 1 Initial

Many growing pentest teams typically begin at this stage. Work gets done, but mainly through individual effort.

A Level 1 team usually shows these signs:

  • Hero culture dominates because delivery depends on the most experienced consultant remembering what good looks like.
  • Reports vary by author so clients receive inconsistent wording, evidence quality, and remediation depth.
  • Follow-up is reactive because there's no dependable mechanism for carrying lessons from one engagement to the next.

Level 1 isn't incompetence. It's informality. The risk is that quality becomes unpredictable under pressure.

Level 2 Managed

At this stage, the team has basic control. There are templates, some defined approvals, and a shared expectation for how work should move.

Typical signs include a standard intake path, a consistent report shell, basic review checkpoints, and named owners for delivery activities. The team isn't elegant yet, but it's less chaotic. You can usually tell who is responsible for what.

This is often the first level where security managers can answer client questions without scrambling through inboxes and chat logs.

Level 3 Defined

Level 3 is where teams stop operating as a collection of individual habits and start operating as a real service.

The key shift is standardisation across the team. Methodology becomes documented. Reporting language is governed. Severity decisions are calibrated. Evidence handling is consistent. New hires can be trained into the model rather than forced to reverse-engineer it from old projects.

What Level 3 feels like: reviewers spend less time fixing structure and more time improving substance.

For pentest practices, this level often makes the biggest visible difference to clients because outputs start to feel stable and professional.

Level 4 Quantitatively Managed

This level introduces disciplined measurement. Not vanity metrics. Operational metrics that help the team predict delivery and spot bottlenecks early.

A security team at Level 4 may track trends in QA defects, review cycle times, report turnaround, remediation lag, or scoping changes that affect delivery quality. The point isn't to create dashboard theatre. It's to make operating decisions based on evidence.

When a team reaches this level, surprises become less common because weak signals are visible sooner.

Level 5 Optimising

Level 5 is where improvement becomes part of normal work. The team doesn't wait for major pain before fixing things. It uses feedback, operating data, and practical experimentation to refine the service continuously.

A mature pentest function at this level might revise finding libraries based on recurring client misunderstandings, improve scoping pathways after analysing change requests, or tighten remediation workflows after repeated delays with certain handoffs.

This is not about perfection. It's about learning faster than the problems repeat.

How ITIL Maturity Applies to Security and Pentesting

Security teams often dismiss ITIL because they associate it with ticket queues and approval boards. That's too narrow. In practice, the itil maturity model maps well to the parts of security work that create friction: intake, coordination, reporting, escalation, remediation, and improvement.

The value becomes obvious when you stop asking, “How mature is our ITSM function?” and start asking, “How reliably do we deliver a security service?”

A digital graphic about ITIL maturity in security and pentesting featuring glass spheres on rocks.

Information Security Management is more than policy

The security practice that matters most here is often Information Security Management, but not in the narrow compliance sense. In a pentest context, this includes how findings are classified, how risk is communicated, how evidence is handled, and how remediation is tracked into operational change.

PeopleCert data cited for UK organisations shows a sharp difference between lower and higher maturity. At Level 2, firms achieved 62% compliance with security practice success factors and averaged 45 days for vulnerability patching. At Level 4, average patch times dropped to 12 days, a 73% improvement, with stronger use of quantitative metrics across the four dimensions, according to PeopleCert's maturity-related security benchmark information.

That's a practical lesson for pentesters. If your report lands and the client still can't act quickly, the issue may not be the finding itself. It may be immature change paths, unclear ownership, or weak supplier coordination.

The ITIL practices security teams should care about first

You don't need to operationalise every practice at once. Start with the ones that directly influence delivery quality.

  • Service Request Management
    This affects how pentest requests are submitted, scoped, approved, and scheduled. A weak request process creates bad assumptions before testing even starts.

  • Change Enablement
    This matters after findings are delivered. If a client or internal team can't route remediation changes cleanly, vulnerabilities sit longer than they should. For teams trying to tighten this area, mastering ITIL change for operations is a practical read because it focuses on implementation trade-offs rather than theory.

  • Incident Management
    This becomes relevant when testing uncovers urgent issues that need immediate escalation. Maturity here determines whether the response is controlled or improvised.

  • Problem Management In Problem Management, recurring security weaknesses get treated as systemic issues rather than isolated findings. If every test reveals the same identity or hardening failures, problem management is what turns repetition into root-cause action.

  • Continual Improvement
    This is the engine that stops each engagement from being a one-off. Without it, post-project lessons are just forgotten observations.

What this means for reporting and vulnerability workflows

A lot of pentest practices think they have a reporting problem when they in fact have a maturity problem.

If the team hasn't defined severity logic, evidence standards, peer review criteria, and remediation wording rules, reports will stay inconsistent no matter how strong the consultants are. That's why Level 3 matters so much in security delivery. It pushes teams to standardise the way findings are described and handled, not just the way they're formatted.

For a broader way to think about progression, this maturity model levels guide is useful because it helps separate ad hoc competence from repeatable operating discipline.

A mature pentest service doesn't just find vulnerabilities. It moves information cleanly from discovery to decision to remediation.

Where bureaucracy goes wrong

Security leaders are right to be sceptical of process theatre.

If an ITIL initiative creates extra approvals, slower testing, and larger templates without improving handoffs or outcomes, it has failed. The model should reduce ambiguity. It should not turn a sharp security team into a slow committee.

Use ITIL where it strengthens operational clarity. Ignore the parts people use to hide weak leadership behind paperwork.

Assessing Your Security Team's ITIL Maturity

A useful maturity assessment doesn't start with a giant spreadsheet. It starts with one honest question. Where does work become unreliable?

For a pentest team, the answer is rarely “everywhere”. More often it's one of these: intake and scoping, evidence handling, reporting consistency, urgent escalation, or remediation follow-up. That's where your first assessment should focus.

AXELOS states that assessments evaluate 34 practices against 5-level scales. The same maturity-related guidance notes that at Level 1, only 18% of UK public-sector organisations meet governance practice success factors, with incident mean time to acknowledge exceeding 72 hours, while Level 5 organisations with data-driven integration across the SVS can reduce MTTA to under 4 hours, as reflected in AXELOS material on ITIL maturity.

Start narrow and evidence-based

Don't try to assess the whole security function in one pass. Pick one or two service areas where inconsistency is already visible.

Good starting points for a security team are:

  1. Information Security Management if findings, risk language, and remediation advice vary too much.
  2. Change Enablement if patching and follow-up stall after delivery.
  3. Service Request Management if projects begin with unclear scope or shifting assumptions.
  4. Continual Improvement if the same delivery mistakes keep resurfacing.

The point isn't to win a maturity grade. It's to identify where operational friction is eroding service quality.

Gather evidence from real work, not intentions

Teams often score themselves based on what they believe should be happening. That produces flattering nonsense.

Use evidence instead:

  • Past reports to check whether findings are named, structured, and evidenced consistently.
  • Scoping records to see how often requests arrive incomplete or change midstream.
  • Review comments to identify recurring quality defects.
  • Ticket history to track whether remediation handoffs are clear.
  • Team interviews to compare formal process with actual day-to-day behaviour.

If three consultants describe the same workflow three different ways, that workflow isn't defined.

Score the behaviour you can observe

A simple internal scale works well for a first pass. You don't need a formal assessor to get value from this.

Use something like:

  • 0 for absent or inconsistent
  • 1 for partially present
  • 2 for consistently present and evidenced

Then score each criterion against what the team does, not what a policy says.

Sample Security Practice Maturity Assessment Template

Assessment Criterion (for 'Information Security Management') Evidence Source Score (0-2) Notes
Finding severity criteria are documented and used consistently Sample of recent pentest reports
Evidence handling standards exist for screenshots, PoCs, and reproduction steps Report QA checklist, peer review comments
Remediation guidance follows a common structure and tone Delivered reports, remediation review notes
Escalation path exists for critical findings discovered during testing Incident records, team interviews
Findings are reviewed for duplication and library consistency Report comparison, reviewer feedback
Lessons from completed engagements feed into future work Retrospective notes, process updates

What a useful assessment should produce

You want three outputs.

First, a baseline. Where are you inconsistent? Second, a priority list. Which issues cause the most downstream pain? Third, a small next-step plan. What can the team standardise in the next month without slowing delivery?

That's enough to make the model practical. Anything larger usually collapses under its own weight.

Your Roadmap to Higher Security Service Maturity

Establishing a grand transformation programme is unnecessary for many organizations. They require a sequence of sensible operational improvements that stick.

That matters because formal assessment is still not common. A UK ITSMF benchmark report found that only 28% of UK enterprises had conducted formal ITIL 4 maturity assessments, and 61% cited a lack of customized ROI metrics as the main barrier. The same benchmark reported that firms reaching Level 3 or above saw 22% higher service uptime and 18% cost savings in IT operations, as summarised in this benchmark discussion of ITIL maturity adoption.

A roadmap diagram showing three levels of security service maturity labeled Basic, Intermediate, and Advanced.

From Level 1 to Level 2

The first move is control, not sophistication.

Create a standard operating baseline for how work enters the team, how testing artefacts are stored, and how reports are reviewed before delivery. If your intake process still lives across inboxes, chat threads, and memory, fix that first. If every consultant writes findings from scratch, create a controlled structure for naming, severity rationale, and remediation format.

Three actions usually pay off quickly:

  • Standardise intake so every engagement starts with the same minimum scoping information.
  • Define report essentials including mandatory evidence types, review checks, and severity rules.
  • Assign ownership for QA, client communication, and remediation follow-up.

The common pitfall is tool-obsession. Buying a platform without agreeing how the team should work only digitises disorder.

From Level 2 to Level 3

In this stage, you transform local habits into team-wide standards.

Document the workflow in a way people will actually use. Keep it close to delivery. Show how requests are accepted, who reviews what, when urgent findings escalate, and how completed engagements feed improvements back into the system. Train the team on the operating model, then check whether they follow it under deadline pressure.

A few signs that you're making the right shift:

  • Review comments become more about judgement and less about formatting.
  • New consultants can follow the delivery model without constant rescue.
  • Clients receive more consistent outputs regardless of who performed the test.

The pitfall here is writing procedures that read well but don't match reality. If your documented process ignores how consultants gather evidence or manage edge cases, people will work around it.

Field note: Security teams improve faster when they standardise small repeatable actions first, not when they publish a huge process manual.

From Level 3 to Level 4

Now measurement starts to matter. At this stage, some teams lose the plot and start building dashboards no one uses.

Keep the metric set small and operational. Track cycle time for report review, frequency of scope changes, recurring QA defects, age of open remediation items, and delays caused by third-party dependencies. Use the numbers to make decisions, not to impress management.

This stage is also where cross-functional friction becomes visible. Patch delays may be caused by supplier constraints. Urgent findings may stall because escalation paths are unclear. If you don't look across the four dimensions, you'll blame the wrong part of the system.

The pitfall is metric theatre. If a measure doesn't help someone change behaviour, remove it.

From Level 4 to Level 5

At this point the team already runs with discipline. The next step is making improvement continuous rather than episodic.

Good Level 5 behaviour looks like this in security work:

  • Reviewing recurring findings to improve testing heuristics and remediation guidance.
  • Refining service design after analysing delivery bottlenecks or client confusion points.
  • Testing process changes deliberately instead of making random adjustments after a painful project.

At this stage, many mature teams integrate security delivery with broader governance. Remediation trends inform change discussions. Frequent scoping issues trigger request workflow redesign. Repeat reporting defects lead to better evidence standards and peer review criteria.

For a broader perspective on structured maturity growth outside pure ITSM, this PMO maturity model article is helpful because the same lesson applies. Maturity comes from repeatable governance plus usable operating habits, not from more paperwork.

What works and what doesn't

What works:

  • Narrow scope first so the team can improve one service area properly.
  • Visible standards that live in real delivery workflows.
  • Short feedback loops after each engagement.
  • Metrics tied to bottlenecks rather than vanity reporting.

What doesn't work:

  • Massive framework rollouts that bury teams in terminology.
  • Over-designed approvals that slow urgent security action.
  • Process documents without ownership.
  • Trying to leap straight to optimisation before Level 2 discipline exists.

If you want the shortest version, it's this. Get the basics repeatable. Then make them measurable. Then make them adaptable.

Conclusion Turning Process Into a Competitive Advantage

The itil maturity model matters for security teams because it solves a practical problem. It helps you replace inconsistency with a service that clients and internal stakeholders can trust.

That means fewer delivery surprises, cleaner reporting, clearer remediation paths, and better use of your team's time. It also means less dependence on heroics. The strongest pentest practices aren't the ones with the most talented individuals alone. They're the ones that turn good technical work into a repeatable operating system.

Used badly, ITIL becomes bureaucracy. Used properly, it becomes a way to remove noise from security delivery. That's the distinction that matters.

If your team feels busy but unpredictable, don't start with a transformation programme. Start with one workflow. Assess how requests enter the team, how findings are handled, or how reports get reviewed. Find the friction. Standardise it. Measure it. Improve it.

That's how a security function stops being a reactive cost centre and starts operating like a dependable service.


If you want to put these ideas into practice without losing hours to manual formatting and repetitive reporting work, Vulnsy is built for that exact gap. It helps pentesters and security teams standardise findings, capture evidence cleanly, collaborate on reports, and produce professional deliverables faster, so your maturity improvements show up in the work clients see.

itil maturity modelservice managementcybersecurity processpentest reportingitil 4
Share:
LT

Written by

Luke Turvey

Security professional at Vulnsy, focused on helping penetration testers deliver better reports with less effort.

Ready to streamline your pentest reporting?

Start your 14-day trial today and see why security teams love Vulnsy.

Start Your Trial — $13

Full access to all features. Cancel anytime.