
Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2)
Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2)
Compliance Guide:
Aligning to the Cybersecurity Capability Maturity Model (C2M2)
Download Guide

The Cybersecurity Capability Maturity Model (C2M2) is a voluntary standard published by the U.S. Department of Energy (DOE) that helps organizations in the energy industry measure the maturity of their cybersecurity capabilities in a consistent manner. The C2M2 is comprised of 10 domains, which are all closely aligned with categories used by other industry cybersecurity standards, like the NIST Cybersecurity Framework. They include:
- Risk Management [RM]
- Asset, Change, and Configuration Management [ACM]
- Identity and Access Management [IAM]
- Threat and Vulnerability Management [TVM]
- Situational Awareness [SA]
- Information Sharing and Communications [ISC]
- Event and Incident Response, Continuity of Operations [IR]
- Supply Chain and External Dependencies Management [EDM]
- Workforce Management [WM]
- Cybersecurity Program Management [CPM]
In this C2M2 compliance guide, we dive into the objectives for each domain in this model and how Industrial Defender’s Automation System Manager (ASM®) helps you align with them.