- Getting Started
- Understanding the Platform
- Using the Criteria Reference
- Performing Security Evaluations
- Understanding Results
- Using the Risk Matrix
- Administrative Functions
- Best Practices
- Troubleshooting
The MAXimum Security Priority Calculator is a comprehensive security evaluation tool designed to help organisations assess the risk of application installation requests. It provides standardized, weighted scoring across different platform types to ensure consistent security decision-making.
-
Navigate to the platform URL in your web browser
-
The homepage provides an overview of features and capabilities
-
Use the navigation bar to access different sections:
-
Criteria Reference: View all security criteria and scoring guidelines
-
Calculator: Perform security evaluations
-
Risk Matrix: Visualize evaluation results and trends
-
Admin: Configure platform types and criteria (admin access required)
The calculator supports multiple platform types, each with tailored security criteria:
- SaaS (Software as a Service): Cloud-based applications
- Locally Installed: Applications installed on local devices
- OAuth: Applications using OAuth for authorization
- Plugins: Browser extensions, IDE plugins, and application add-ons
- Whitelisting websites: Requests to whitelist blocked websites and domains
-
Scores range from 0-100 for each criterion
-
Weighted scoring ensures important criteria have greater impact
-
Final recommendations:
-
80-100: Approve (Green)
-
60-79: Approve with conditions (Yellow/Orange)
-
0-59: Reject (Red)
The Criteria Reference is your comprehensive guide to understanding all security evaluation criteria across platform types. Start here to familiarize yourself with evaluation standards.
-
Navigate to Criteria Reference (first tab in navigation)
-
Select a platform type using the tabs at the top
-
Review each criterion:
-
Description: Detailed explanation of what's being evaluated
-
Weight: Relative importance in the overall score
-
Available Options: All possible choices with scores
-
Preferred Choice: Highest-scoring option (marked with β )
- Color coding: Green (80-100) = Low risk, Yellow (60-79) = Medium risk, Orange (40-59) = High risk, Red (0-39) = Critical risk
- Export functionality: Download criteria as CSV for offline reference
- Platform comparison: View statistics across all platform types
Review the Criteria Reference before performing evaluations to understand scoring rationale and preferred security configurations.
-
Navigate to Calculator
-
Select Platform Type: Choose the appropriate category for your application
-
Enter Application Information:
-
Application Name: Clear, descriptive name
-
Description: Brief explanation of functionality (optional but recommended)
-
Requestor: Name of person requesting the application
-
Click "Continue to Evaluation"
The evaluation interface presents a calculator-style layout with:
- Review entered details at the top of the page
- Verify platform type and requestor information
- Overall Score: Updates automatically as you make selections
- Progress bar: Visual representation of current score
- Recommendation: Updates based on current score
- Detailed Scores: Shows weighted scores for each completed criterion
Each criterion appears as a calculator button with:
- Criterion name and number
- Weight percentage
- Help icon (hover for detailed guidance)
- Description toggle (expandable explanation)
- Radio button options with scores
- Work through each criterion systematically
- Use the help tooltips for guidance on each criterion
- Consider the "Internal Alternative Exists?" criterion first - this appears at the top of all platform types
- Watch the real-time score updates as you make selections
- Review detailed scores to understand the impact of each choice
- All criteria must be answered before getting a final recommendation
- Export to PDF once complete for documentation
- Start New Evaluation to assess another application
- 80-100 (Approve): Application meets security requirements
- 60-79 (Approve with conditions): Application acceptable with additional controls
- 0-59 (Reject): Application does not meet security standards
Each criterion shows:
- Selected option and its raw score (0-100)
- Weight percentage of the criterion
- Weighted points contributed to total score
- Progress bar showing relative contribution
- π’ Approve: Strong security posture, minimal additional controls needed
- π Approve with conditions: Acceptable risk with compensating controls
- π΄ Reject: Unacceptable risk level, recommend alternative solutions
Generated reports include:
- Application details and evaluation date
- Overall score and recommendation
- Detailed criterion-by-criterion breakdown
- Explanation of recommendation rationale
The Risk Matrix provides visual analysis of all completed evaluations:
- X-axis: Risk Level (higher = more risk)
- Y-axis: Business Impact (higher = more impact)
- Color coding: Green (Approved), Orange (Conditional), Red (Rejected)
- Interactive points: Hover for detailed information
- Platform Type: Filter by specific platform categories
- Recommendation: Show only specific recommendation types
- Time Range: Adjust date ranges for trend analysis
Switch to the "Risk Trends" tab for:
- Average security scores over time
- Evaluation volume trends
- Recommendation distribution patterns
- Trend indicators showing directional changes
- Total evaluations by recommendation type
- Average scores across time periods
- Approval rates and trend analysis
Administrators can:
- Add new platform types with custom descriptions
- Edit existing platform types
- Delete unused platform types
For each platform type:
- Add new security criteria with descriptions and weights
- Edit existing criteria including names, descriptions, and weights
- Delete outdated criteria
- Normalize weights to ensure they sum to 100%
For each criterion:
- Add scoring options with values (0-100) and descriptions
- Edit existing options to update labels, scores, or descriptions
- Delete unused options
- Regularly review criteria to ensure they remain current
- Normalize weights after making changes
- Test new criteria with sample evaluations
- Document changes for audit purposes
- Review the Criteria Reference to understand scoring methodology
- Gather application information including vendor details, functionality, and business justification
- Identify the correct platform type for accurate evaluation
- Answer "Internal Alternative Exists?" first - this is prioritized across all platform types
- Use help tooltips for guidance on unfamiliar criteria
- Consider business context when making selections
- Review real-time scores to understand the impact of choices
- Export PDF reports for documentation and approval workflows
- Review recommendations with stakeholders
- Implement additional controls for conditional approvals
- Monitor approved applications for ongoing compliance
- Use the same evaluation approach across similar applications
- Document rationale for scoring decisions
- Regular training on criteria interpretation
- Periodic review of evaluation outcomes
- Cause: Evaluation not complete
- Solution: Ensure all criteria have been answered before exporting
- Cause: Missing answers in evaluation
- Solution: Review all criteria and ensure radio button selections are made
- Cause: Data synchronization issue
- Solution: Refresh the page and restart evaluation
- Cause: Weighted scoring system
- Solution: Remember that scores are weighted by criterion importance, not simple averages
- Review this guide for detailed instructions
- Check the Criteria Reference for scoring explanations
- Contact system administrators for technical issues
- Refer to organisational security policies for evaluation guidance
- Criteria Reference β Review scoring guidelines
- Calculator β Enter app details
- Calculator β Complete security evaluation
- Export PDF β Document results
- Risk Matrix β Track trends and patterns
- 80+: Approve
- 60-79: Approve with conditions
- 0-59: Reject
"Internal Alternative Exists?" appears first in all platform types - consider this fundamental question before proceeding with external application evaluation.
This guide covers the essential functions of the MAXimum Security Priority Calculator. For additional support or advanced configuration options, consult your system administrator or security team.
π¬π§ π¬π§