logo

C2M2


Summary

The Cybersecurity Capability Maturity Model (C2M2) is a tool for evaluating and improving cybersecurity. It focuses on the implementation and management of cybersecurity practices associated with information, information technology (IT), and operations technology (OT) assets and the environments in which they operate. The version used in this section is C2M2 v2.1, June 2022.


Definitions

DefinitionRequirements
C2M2-1_1_h. Manage IT and OT asset inventory
C2M2-1_2_h. Manage IT and OT asset inventory
C2M2-1_4_e. Manage changes to IT and OT assets
C2M2-1_4_i. Manage changes to IT and OT assets
C2M2-2_1_d. Reduce cybersecurity vulnerabilities
C2M2-2_1_j. Reduce cybersecurity vulnerabilities
C2M2-2_3_d. Management activities for the THREAT domain
C2M2-3_2_k. Identify cyber risk
C2M2-3_5_d. Management activities for the RISK domain
C2M2-4_1_a. Establish identities and manage authentication
C2M2-4_1_b. Establish identities and manage authentication
C2M2-4_1_c. Establish identities and manage authentication
C2M2-4_1_d. Establish identities and manage authentication
C2M2-4_1_f. Establish identities and manage authentication
C2M2-4_1_g. Establish identities and manage authentication
C2M2-4_1_h. Establish identities and manage authentication
C2M2-4_1_i. Establish identities and manage authentication
C2M2-4_1_j. Establish identities and manage authentication
C2M2-4_2_i. Control logical access
C2M2-5_2_c. Perform monitoring
C2M2-5_2_d. Perform monitoring
C2M2-5_2_e. Perform monitoring
C2M2-6_1_c. Detect cybersecurity events
C2M2-6_1_f. Detect cybersecurity events
C2M2-7_1_c. Identify and prioritize third parties
C2M2-7_2_a. Manage third-party risk
C2M2-7_2_b. Manage third-party risk
C2M2-7_2_c. Manage third-party risk
C2M2-8_3_c. Assign cybersecurity responsibilities
C2M2-8_3_e. Assign cybersecurity responsibilities
C2M2-9_2_b. Implement network protections for cybersecurity architecture
C2M2-9_2_c. Implement network protections for cybersecurity architecture
C2M2-9_2_e. Implement network protections for cybersecurity architecture
C2M2-9_2_f. Implement network protections for cybersecurity architecture
C2M2-9_2_g. Implement network protections for cybersecurity architecture
C2M2-9_2_k. Implement network protections for cybersecurity architecture
C2M2-9_2_l. Implement network protections for cybersecurity architecture
C2M2-9_3_b. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_c. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_d. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_e. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_f. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_l. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_3_m. Implement IT and OT asset security for cybersecurity architecture
C2M2-9_4_a. Implement software security for cybersecurity architecture
C2M2-9_4_b. Implement software security for cybersecurity architecture
C2M2-9_4_c. Implement software security for cybersecurity architecture
C2M2-9_4_d. Implement software security for cybersecurity architecture
C2M2-9_4_g. Implement software security for cybersecurity architecture
C2M2-9_5_a. Implement data security for cybersecurity architecture
C2M2-9_5_b. Implement data security for cybersecurity architecture
C2M2-9_5_c. Implement data security for cybersecurity architecture
C2M2-9_5_d. Implement data security for cybersecurity architecture
C2M2-9_5_e. Implement data security for cybersecurity architecture
C2M2-9_5_h. Implement data security for cybersecurity architecture

Last updated

2023/09/18