logo

Database

C2M2

Last updated: 2023/09/18
logo

The Cybersecurity Capability Maturity Model (C2M2) is a tool for evaluating and improving cybersecurity. It focuses on the implementation and management of cybersecurity practices associated with information, information technology (IT), and operations technology (OT) assets and the environments in which they operate. The version used in this section is C2M2 v2.1, June 2022.

Control-Requirement Mapping

DefinitionRequirements
1_1_h. Manage IT and OT asset inventory
1_2_h. Manage IT and OT asset inventory
1_4_e. Manage changes to IT and OT assets
1_4_i. Manage changes to IT and OT assets
2_1_d. Reduce cybersecurity vulnerabilities
2_1_j. Reduce cybersecurity vulnerabilities
2_3_d. Management activities for the THREAT domain
3_2_k. Identify cyber risk
3_5_d. Management activities for the RISK domain
4_1_a. Establish identities and manage authentication
4_1_b. Establish identities and manage authentication
4_1_c. Establish identities and manage authentication
4_1_d. Establish identities and manage authentication
4_1_f. Establish identities and manage authentication
4_1_g. Establish identities and manage authentication
4_1_h. Establish identities and manage authentication
4_1_i. Establish identities and manage authentication
4_1_j. Establish identities and manage authentication
4_2_i. Control logical access
5_2_c. Perform monitoring
5_2_d. Perform monitoring
5_2_e. Perform monitoring
6_1_c. Detect cybersecurity events
6_1_f. Detect cybersecurity events
7_1_c. Identify and prioritize third parties
7_2_a. Manage third-party risk
7_2_b. Manage third-party risk
7_2_c. Manage third-party risk
8_3_c. Assign cybersecurity responsibilities
8_3_e. Assign cybersecurity responsibilities
9_2_b. Implement network protections for cybersecurity architecture
9_2_c. Implement network protections for cybersecurity architecture
9_2_e. Implement network protections for cybersecurity architecture
9_2_f. Implement network protections for cybersecurity architecture
9_2_g. Implement network protections for cybersecurity architecture
9_2_k. Implement network protections for cybersecurity architecture
9_2_l. Implement network protections for cybersecurity architecture
9_3_b. Implement IT and OT asset security for cybersecurity architecture
9_3_c. Implement IT and OT asset security for cybersecurity architecture
9_3_d. Implement IT and OT asset security for cybersecurity architecture
9_3_e. Implement IT and OT asset security for cybersecurity architecture
9_3_f. Implement IT and OT asset security for cybersecurity architecture
9_3_l. Implement IT and OT asset security for cybersecurity architecture
9_3_m. Implement IT and OT asset security for cybersecurity architecture
9_4_a. Implement software security for cybersecurity architecture
9_4_b. Implement software security for cybersecurity architecture
9_4_c. Implement software security for cybersecurity architecture
9_4_d. Implement software security for cybersecurity architecture
9_4_g. Implement software security for cybersecurity architecture
9_5_a. Implement data security for cybersecurity architecture
9_5_b. Implement data security for cybersecurity architecture
9_5_c. Implement data security for cybersecurity architecture
9_5_d. Implement data security for cybersecurity architecture
9_5_e. Implement data security for cybersecurity architecture
9_5_h. Implement data security for cybersecurity architecture