C2M2 V2.1 PDF-Based Self-Evaluation Tool User Guide
C2M2 V2.1 PDF-Based Self-Evaluation Tool User Guide
TABLE OF CONTENTS
1. Introduction .............................................................................................................................................. 1
1.1 Purpose............................................................................................................................................ 1
1.2 Data Privacy .................................................................................................................................... 1
1.3 System Requirements .................................................................................................................... 2
2. Tool Usage Process .................................................................................................................................. 3
2.1 Initial Setup ..................................................................................................................................... 3
2.2 Table of Contents and Information About the Organization ......................................................... 4
2.3 Information About the Organization ............................................................................................... 6
2.4 Performing the Self-Evaluation ...................................................................................................... 6
2.5 Report Generation .......................................................................................................................... 8
2.6 Revising Self-Evaluation Responses .............................................................................................. 8
2.7 Data Import and Export .................................................................................................................. 9
2.8 Self-Evaluation Results Comparison ............................................................................................ 10
3. Interpreting the Self-Evaluation Report ................................................................................................ 13
3.1 Section 1 – Introduction ............................................................................................................... 13
3.2 Section 2 – Model Architecture ................................................................................................... 13
3.3 Section 3 – Summary of Results by Domain............................................................................... 13
3.4 Section 4 – Detailed Evaluation Results ..................................................................................... 14
3.5 Section 5 – Using the Model ........................................................................................................ 14
3.6 Section 6 – Self-Evaluation Notes ............................................................................................... 15
3.7 Section 7 – Summary of Partially Implemented and Not Implemented Practices ................... 15
4. Interpreting the Self-Evaluation Results Comparison Report.............................................................. 16
4.1 Section 1 – Introduction ............................................................................................................... 16
4.2 Section 2 – MIL Achievement Comparison by Domain .............................................................. 16
4.3 Section 3 – Comparison of Practice Implementation by Domain .............................................. 16
4.4 Section 4 – Comparison of Practice Implementation by Objective ........................................... 16
4.5 Section 5 – Detailed Self-Evaluation Results Comparison ........................................................ 17
LIST OF FIGURES
Figure 1 - Enable All Features Button ......................................................................................................... 3
Figure 2 - Cover of the C2M2 Self-Evaluation Tool .................................................................................... 4
Figure 3 - Tool Table of Contents ................................................................................................................ 5
Figure 4 - Information About the Organization ........................................................................................... 6
Figure 5 – Objectives and Practices Section.............................................................................................. 7
Figure 6 - Practice Glossary Definition Pop-Up........................................................................................... 8
Figure 7 - Practice Glossary Definition Window ......................................................................................... 8
i
TABLE OF CONTENTS
Figure 8 - Report Table of Contents (TOC) .................................................................................................. 9
Figure 9 - Report Generation, Data Import and Export ............................................................................ 10
Figure 10 - Self-Evaluation Comparison Data Set Import........................................................................ 11
Figure 11 - Successful Import of Five Data Sets ...................................................................................... 12
Figure 12 - Potential Approach for Using the C2M2 Model..................................................................... 15
ii
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
1. INTRODUCTION
The Cybersecurity Capability Maturity Model (C2M2) focuses on the implementation and
management of cybersecurity practices associated with information technology (IT),
operations technology (OT), and information assets and the environments in which they
operate. The model can be used to:
strengthen the cybersecurity capabilities of organizations
enable organizations to effectively and consistently evaluate and benchmark
cybersecurity capabilities
share knowledge, best practices, and relevant references across organizations to
improve cybersecurity capabilities
enable organizations to prioritize actions and investments to improve
cybersecurity capabilities
The C2M2 model document describes a self-evaluation methodology that an organization
can use to evaluate its cybersecurity capabilities consistently, to communicate its capability
levels in meaningful terms, and to inform the prioritization of its cybersecurity investments.
The C2M2 V2.1 PDF-Based Self-Evaluation Tool (“the Tool”) supports this methodology by
providing a mechanism to capture and report upon the implementation levels of an
organization’s cybersecurity capabilities. For more detailed information, refer to Section 5,
“Using the Model,” in Cybersecurity Capability Maturity Model (C2M2) V2.1.
In addition to the C2M2 V2.1 PDF-Based Self-Evaluation Tool, the Department of Energy
(DOE) has also made a C2M2 V2.1 HTML-based Self-Evaluation tool available to perform
self-evaluations. These tools were designed to be interoperable and exported results of a
self-evaluation can be imported into either tool.
1.1 Purpose
This guide is intended to help users of the Tool complete a self-evaluation, in conjunction
with guidance from Cybersecurity Capability Maturity Model V2.1 and C2M2 V2.1 Self-
Evaluation Guide. This document describes:
requirements for using the Tool
Tool navigation and access features
report generation and interpretation
comparison of self-evaluations
can export it. Organizations should consider safeguards for the data input into the Tool and
follow organizational and critical infrastructure protection requirements.
2
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
3
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
5. When the cover of Self-Evaluation Tool, Version 2.1 appears, the file is enabled and
ready for use.
4
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
Page 1 shows the Table of Contents Page with a link to the right of each domain
name.
5
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
6
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
The Objectives and Practices Section is used to input the implementation level of each
practice and associated notes for each domain objective, as well as practice-level guidance
and key terms.
A B C D
7
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
8
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
9
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
B C D
10
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
A B C
11
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
12
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
repeating the self-evaluation process may help track progress in meeting MIL and
implementation targets.
15
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
16
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
17
C2M2, V2.1 PDF-Based Self-Evaluation Tool User Guide
18