Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
C2M2 helps organizations evaluate their cybersecurity capabilities using a set of industry-vetted practices focused on IT and OT assets and environments.
The Cybersecurity Capability Maturity Model (C2M2) helps organizations evaluate their cybersecurity capabilities and optimize security investments.
This level includes the MIL1 requirements and other measures included in other supported frameworks, giving an estimated 50% coverage of the full framework.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
MIL1 requirements
a. Logical and physical access controls are implemented to protect assets that are important to the delivery of the function, where feasible, at least in an ad hoc manner
b. Endpoint protections (such as secure configuration, security applications, and host monitoring) are implemented to protect assets that are important to the delivery of the function, where feasible, at least in an ad hoc manner
MIL2 requirements
c. The principle of least privilege (for example, limiting administrative access for users and service accounts) is enforced
d. The principle of least functionality (for example, limiting services, limiting applications, limiting ports, limiting connected devices) is enforced
e. Secure configurations are established and maintained as part of the asset deployment process where feasible
f. Security applications are required as an element of device configuration where feasible (for example, endpoint detection and response, host-based firewalls)
g. The use of removeable media is controlled (for example, limiting the use of USB devices, managing external hard drives)
h. Cybersecurity controls are implemented for all assets within the function either at the asset level or as compensating controls where asset-level controls are not feasible
i. Maintenance and capacity management activities are performed for all assets within the function
j. The physical operating environment is controlled to protect the operation of assets within the function
k. More rigorous cybersecurity controls are implemented for higher priority assets
MIL3 requirements
l. Configuration of and changes to firmware are controlled throughout the asset lifecycle
m. Controls (such as allowlists, blocklists, and configuration settings) are implemented to prevent the execution of unauthorized code
MIL2 requirements
a. Software developed in-house for deployment on higher priority assets is developed using secure software development practices
b. The selection of procured software for deployment on higher priority assets includes consideration of the vendor’s secure software development practices
c. Secure software configurations are required as part of the software deployment process for both procured software and software developed in-house
MIL3 requirements
d. All software developed in-house is developed using secure software development practices
e. The selection of all procured software includes consideration of the vendor’s secure software development practices
f. The architecture review process evaluates the security of new and revised applications prior to deployment
g. The authenticity of all software and firmware is validated prior to deployment
h. Security testing (for example, static testing, dynamic testing, fuzz testing, penetration testing) is performed for in-house-developed and in-house-tailored applications periodically and according to defined triggers, such as system changes and external events
MIL1 requirements
a. Sensitive data is protected at rest, at least in an ad hoc manner
MIL2 requirements
b. All data at rest is protected for selected data categories
c. All data in transit is protected for selected data categories
d. Cryptographic controls are implemented for data at rest and data in transit for selected data categories
e. Key management infrastructure (that is, key generation, key storage, key destruction, key update, and key revocation) is implemented to support cryptographic controls
f. Controls to restrict the exfiltration of data (for example, data loss prevention tools) are implemented
MIL3 requirements
g. The cybersecurity architecture includes protections (such as full disk encryption) for data that is stored on assets that may be lost or stolen
h. The cybersecurity architecture includes protections against unauthorized changes to software, firmware, and data
MIL1 requirements
a. The organization has a cybersecurity program strategy, which may be developed and managed in an ad hoc manner
MIL2 requirements
b. The cybersecurity program strategy defines goals and objectives for the organization’s cybersecurity activities
c. The cybersecurity program strategy and priorities are documented and aligned with the organization’s mission, strategic objectives, and risk to critical infrastructure
d. The cybersecurity program strategy defines the organization’s approach to provide program oversight and governance for cybersecurity activities
e. The cybersecurity program strategy defines the structure and organization of the cybersecurity program
f. The cybersecurity program strategy identifies standards and guidelines intended to be followed by the program
g. The cybersecurity program strategy identifies any applicable compliance requirements that must be satisfied by the program (for example, NERC CIP, TSA Pipeline Security Guidelines, PCI DSS, ISO, DoD CMMC)
MIL3 requirements
h. The cybersecurity program strategy is updated periodically and according to defined triggers, such as business changes, changes in the operating environment, and changes in the threat profile (THREAT-2e)
MIL1 requirements
a. Senior management with proper authority provides support for the cybersecurity program, at least in an ad hoc manner
MIL2 requirements
b. The cybersecurity program is established according to the cybersecurity program strategy
c. Senior management sponsorship for the cybersecurity program is visible and active
d. Senior management sponsorship is provided for the development, maintenance, and enforcement of cybersecurity policies
e. Responsibility for the cybersecurity program is assigned to a role with sufficient authority
f. Stakeholders for cybersecurity program management activities are identified and involved
MIL3 requirements
g. Cybersecurity program activities are periodically reviewed to ensure that they align with the cybersecurity program strategy
h. Cybersecurity activities are independently reviewed to ensure conformance with cybersecurity policies and procedures, periodically and according to defined triggers, such as process changes
i. The cybersecurity program addresses and enables the achievement of legal and regulatory compliance, as appropriate
j. The organization collaborates with external entities to contribute to the development and implementation of cybersecurity standards, guidelines, leading practices, lessons learned, and emerging technologies
Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.