Industrial Internet Security Framework v 1.0 | Page 135
Security Framework
Annex B: Cyber security Capability Maturity Model (C2M2)
Annex B CYBER SECURITY CAPABILITY MATURITY MODEL (C2M2)
The Cyber Security Capability Maturity Model (C2M2) evaluates the maturity of an organization’s
security posture and processes. The model allows for:
•
•
•
assessment of the existing state of the security posture of the organization and its
products,
establishment of a target security profile, which states what security goals are to be
achieved given the current state, existing risks, and business strategies and
prioritization of the gaps identified between the current state and the target profile and
identification of required security activities for addressing those gaps.
The model presents a holistic approach to securing Industrial Internet of Things systems and their
components throughout their lifetime, from early design to implementation, deployment,
maintenance and retirement. It includes evaluation of specific security technologies and the
managerial and business context in which they are used. Such context is absolutely necessary to
identify threats and manage risks to IIoT systems.
C2M2 was developed by the U.S. Department of Energy in conjunction with industry
representatives. Interested readers can refer to the C2M2 framework [ENER-C2M2] for more
detailed information. The model is summarized here because it is this model the Industrial
Internet Consortium uses as part of the IIC testbed process.
The C2M2 maturity model is a set of characteristics, indicators or patterns that represent
capability and progression of behaviors, practices and processes in a particular discipline. An
associated assessment methodology defines best-practice activities, typically grouped into
practice areas. Each requirement is given a score corresponding to a discrete maturity level that
rates the extent to which a best practice is repeatable, practiced and its effectiveness measured.
Each practice area has its own score, as an averaged score is not useful in guiding corrective
actions.
B.1
LOGICAL GROUPINGS
The C2M2 model comprises ten logical groupings of security activities (domains). Each domain 1
has a number of objectives, each of which has a progression of practices at different levels of
maturity—a Maturity Indicator Level (MIL). For example, the Supply Chain and External
Dependencies Management domain is a group of practices that an organization can perform to
manage the risks associated with services and assets that are dependent on external entities.
This domain includes the following objectives: identify dependencies, manage dependency risk
and management activities. The first objective in this domain includes practices such as
identification of Information Technology (IT) and Operational Technology (OT) supplier
dependencies, identification of customer dependencies, and prioritization of dependencies. Each
1
In the IIRA domains are used to segment functionality in the IIoT. In the C2M2 they are used to segment
security activities.
IIC:PUB:G4:V1.0:PB:20160926
- 135 -