DOE Cybersecurity Capability Maturity Model v2.1
Voluntary cybersecurity maturity model developed by the Department of Energy for the energy sector. 10 domains covering asset management, threat and vulnerability management, risk management, identity and access management, situational awareness, event and incident response, third-party risk management, workforce management, cybersecurity architecture, and program management. Each domain assessed across Maturity Indicator Levels (MIL 0-3) measuring organizational capability progression. Used by electric utilities, oil and gas companies, and other energy subsectors for self-assessment.
AC (7) AT (4) AU (3) CA (1) CM (7) CP (5) IA (6) IR (7) PL (3) PM (13) PS (6) RA (6) SA (4) SC (4) SI (3) SR (5)
AC Access Control
AT Awareness and Training
AU Audit and Accountability
CA Security Assessment and Authorization
| Control | Name | DOE C2M2 v2.1 References |
|---|---|---|
| CA-07 | Continuous Monitoring | SITUATION |
CM Configuration Management
| Control | Name | DOE C2M2 v2.1 References |
|---|---|---|
| CM-02 | Baseline Configuration | ASSET |
| CM-03 | Configuration Change Control | ASSET |
| CM-05 | Access Restrictions For Change | ASSET |
| CM-06 | Configuration Settings | ASSET |
| CM-07 | Least Functionality | ASSET |
| CM-08 | Information System Component Inventory | ASSET |
| CM-09 | Configuration Management Plan | ASSET |
CP Contingency Planning
IA Identification and Authentication
| Control | Name | DOE C2M2 v2.1 References |
|---|---|---|
| IA-02 | User Identification And Authentication | ACCESS |
| IA-03 | Device Identification And Authentication | ACCESS |
| IA-04 | Identifier Management | ACCESS |
| IA-05 | Authenticator Management | ACCESS |
| IA-08 | Identification and Authentication (Non-Organizational Users) | ACCESS |
| IA-12 | Identity Proofing | ACCESS |
IR Incident Response
| Control | Name | DOE C2M2 v2.1 References |
|---|---|---|
| IR-01 | Incident Response Policy And Procedures | RESPONSE |
| IR-02 | Incident Response Training | RESPONSE |
| IR-03 | Incident Response Testing And Exercises | RESPONSE |
| IR-04 | Incident Handling | RESPONSE |
| IR-05 | Incident Monitoring | SITUATIONRESPONSE |
| IR-06 | Incident Reporting | RESPONSE |
| IR-08 | Incident Response Plan | RESPONSE |
PL Planning
PM Program Management
| Control | Name | DOE C2M2 v2.1 References |
|---|---|---|
| PM-01 | Information Security Program Plan | PROGRAM |
| PM-02 | Information Security Program Leadership Role | PROGRAM |
| PM-03 | Information Security and Privacy Resources | PROGRAM |
| PM-04 | Plan of Action and Milestones Process | PROGRAM |
| PM-05 | System Inventory | ASSET |
| PM-06 | Measures of Performance | PROGRAM |
| PM-09 | Risk Management Strategy | RISKPROGRAM |
| PM-13 | Security and Privacy Workforce | WORKFORCE |
| PM-14 | Testing, Training, and Monitoring | PROGRAM |
| PM-15 | Security and Privacy Groups and Associations | THREAT |
| PM-16 | Threat Awareness Program | THREAT |
| PM-28 | Risk Framing | RISK |
| PM-30 | Supply Chain Risk Management Strategy | THIRD |