Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2) - Industrial Defender

Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2)

Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2)

Download Guide

The Cybersecurity Capability Maturity Model (C2M2) is a voluntary standard published by the U.S. Department of Energy (DOE) that helps organizations in the energy industry measure the maturity of their cybersecurity capabilities in a consistent manner. The C2M2 is comprised of 10 domains, which are all closely aligned with categories used by other industry cybersecurity standards, like the NIST Cybersecurity Framework. They include:

Risk Management [RM]
Asset, Change, and Configuration Management [ACM]
Identity and Access Management [IAM]
Threat and Vulnerability Management [TVM]
Situational Awareness [SA]
Information Sharing and Communications [ISC]
Event and Incident Response, Continuity of Operations [IR]
Supply Chain and External Dependencies Management [EDM]
Workforce Management [WM]
Cybersecurity Program Management [CPM]

In this C2M2 compliance guide, we dive into the objectives for each domain in this model and how Industrial Defender’s Automation System Manager (ASM®) helps you align with them.