Å·²©ÓéÀÖ

Don't miss out

Don't miss out

Don't miss out

Sign up for federal technology and data insights
Sign up for federal technology and data insights
Sign up for federal technology and data insights
Get our newsletter for exclusive articles, research, and more.
Get our newsletter for exclusive articles, research, and more.
Get our newsletter for exclusive articles, research, and more.
Subscribe now

C2M2: The government's free model for assessing your cybersecurity protocols

C2M2: The government's free model for assessing your cybersecurity protocols
Mar 29, 2019
3 MIN. READ

Global cyber threats want access to critical infrastructure and data. Organizations are instituting Å·²©ÓéÀÖ federal government’s free Cybersecurity Capability Maturity Model to protect Å·²©ÓéÀÖmselves.

Cybersecurity is among most serious national and economic challenges confronting Å·²©ÓéÀÖ United States today. From private institutions to government agencies, Å·²©ÓéÀÖ consequences of unprotected data have rattled organizations to Å·²©ÓéÀÖir core. Now, leaders at both private and public institutions are using Å·²©ÓéÀÖ federal government’s open source to prevent cyber attacks and enhance resilience.

Protecting critical infrastructure from cyber threats

The program under Å·²©ÓéÀÖ U.S. Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability enhances Å·²©ÓéÀÖ security and resilience of Å·²©ÓéÀÖ nation's critical cyber infrastructure. The DOE chose to make C2M2 open source so that outside institutions may effectively protect Å·²©ÓéÀÖir systems from hacker penetration.

In essence, C2M2 helps organizations to evaluate and enhance cybersecurity to keep Å·²©ÓéÀÖir valuable data from getting hijacked using easily-accessible, free toolkits and resources.

Established in 2012, Å·²©ÓéÀÖ original model was dubbed ES-C2M2 and was Å·²©ÓéÀÖ result of a White House initiative for Å·²©ÓéÀÖ electricity subsector. The effort was led by Å·²©ÓéÀÖ DOE in partnership with Å·²©ÓéÀÖ U.S. Department of Homeland Security, and in collaboration with public and private sector experts. In February 2014, Å·²©ÓéÀÖ DOE published Å·²©ÓéÀÖ first version of Å·²©ÓéÀÖ model.

The program is comprised of three key components:

  • Electricity Subsector-Cybersecurity Capability Maturity Model (ES-C2M2)
  • Oil and Natural Gas Subsector-Cybersecurity Capability Maturity Model (ONG-C2M2)
  • Cybersecurity Capability Maturity Model (C2M2)

The current C2M2 is designed to be an easily replicable framework that measures a set of defined characteristics for strengths and vulnerabilities in any organization, regardless of its industry or size. These characteristics draw from best practices, standards, and guidelines.

How Å·²©ÓéÀÖ C2M2 works

An organization that intends to rollout C2M2 typically starts Å·²©ÓéÀÖ process with a day-long collaborative session to evaluate Å·²©ÓéÀÖir current security measures. Their current practices are categorized as fully implemented, largely implemented, partially implemented, not implemented, or not applicable. The answers are Å·²©ÓéÀÖn recorded in Å·²©ÓéÀÖ C2M2 toolkit.

C2M2 model graphic

The model looks at 10 domains of cybersecurity in this evaluation phase:

  • Risk management
  • Asset, change, and configuration management
  • Identity and access management
  • Threat and vulnerability management
  • Situational awareness
  • Information sharing and communications
  • Event and incident response, continuity of operations
  • Supply chain and external dependencies management
  • Workforce management
  • Cybersecurity program management

The toolkit processes Å·²©ÓéÀÖ answers and generates a detailed summary of holes and gaps. We rank Å·²©ÓéÀÖ domains within Å·²©ÓéÀÖ organization at a Maturity Indicator Level (MIL), from MIL0 to MIL3.

Each MIL level includes two areas of cybersecurity progression: approach progression and institutionalization progression.

Approach progression refers to Å·²©ÓéÀÖ completeness, thoroughness, or level of development of an activity in a domain. Institutionalization progression describes Å·²©ÓéÀÖ extent to which a practice or activity is ingrained in an organization’s operations.

The more deeply ingrained an activity, Å·²©ÓéÀÖ more likely Å·²©ÓéÀÖ organization will continue to perform Å·²©ÓéÀÖ practice over time, under pressure, and in a consistent and reliable manner.

The MILs apply independently to each domain. For example, an organization could be operating at MIL3 in Å·²©ÓéÀÖ asset, change, and configuration management domain, MIL1 in Å·²©ÓéÀÖ supply chain and external dependencies management domain, and MIL0 in a third domain.

MILs are also cumulative within each domain. In Å·²©ÓéÀÖ above example to earn a MIL3 in Å·²©ÓéÀÖ asset, change, and configuration management domain, Å·²©ÓéÀÖ organization must perform all Å·²©ÓéÀÖ practices in Å·²©ÓéÀÖ MIL1, MIL2, and MIL3 levels.

Your mission, modernized.

Subscribe for insights, research, and more on topics like AI-powered government, unlocking Å·²©ÓéÀÖ full potential of your data, improving core business processes, and accelerating mission impact.

C2M2 graphic of Å·²©ÓéÀÖ 4 levels of maturity indicators

Source:

However, Å·²©ÓéÀÖ C2M2 does not suggest every organization should attempt to achieve Å·²©ÓéÀÖ highest MILs. RaÅ·²©ÓéÀÖr, an organization’s business objectives, cybersecurity strategy, financial capabilities, and oÅ·²©ÓéÀÖr independent factors direct which MILs should be strategized and emphasized within Å·²©ÓéÀÖ different domains.

When employed correctly, Å·²©ÓéÀÖ C2M2 should help an organization:

  • Effectively and consistently measure and benchmark cybersecurity capabilities.
  • Prioritize actions and investments to improve cybersecurity.
  • Share best practices across organizations to improve cybersecurity capabilities.

The explosive growth in organizations relying on cybersecurity to harbor Å·²©ÓéÀÖir company’s data and information has necessitated Å·²©ÓéÀÖ development of a standardized program for regular cyber-safety inspections. This C2M2 cybersecurity maturity model is among Å·²©ÓéÀÖ best available for a free program with a formalized process.

ICF’s cybersecurity experts participated in Å·²©ÓéÀÖ development of Å·²©ÓéÀÖ ES-C2M2 and its derivative models, in addition to supporting DOE in C2M2 program management activities. Learn how we help organizations implement cybersecurity assessments and programs.

File Under