This material was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the United States Department of Energy, nor the Contractor, nor any or their employees, nor any jurisdiction or organization that has cooperated in the development of these materials, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness or any information, apparatus, product, software, or process disclosed, or represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or Battelle Memorial Institute. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.
PACIFIC NORTHWEST NATIONAL LABORATORY
UNITED STATES DEPARTMENT OF ENERGY
under Contract DE-AC05-76RL01830
Full VersionThe full version of the tools gives a complete listing of questions that is suitable for a in-depth assessment of all of a organizations domains. This version would be suitable for management or those assigned to do full scope assessment.
Lite VersionThe lite version of the tool provides an abbreviated listing of the full question set that is suitable for limited scope assessments. This is suitable for non-management personnel who wish to look at their readiness in preparation for larger assessments.
This Evaluation Toolkit enables an organization to evaluate the maturity of its building system's security capabilities based on the C2M2 Version 1.1.
The C2M2 can be obtained from http://energy.gov/oe/downloads/cybersecurity-capability-maturity-model-february-2014,
or by emailing the Department of Energy (DOE) at C2M2@doe.gov.
The C2M2 materials are furnished on an as-is basis.
The DOE makes no warranties of any kind, either expressed or implied, as to any matter including, but not limited to, results obtained from this toolkit.
For further questions regarding B-C2M2, please contact us.
This report is provided "as is" for informational purposes only. The Department of Energy (DOE) does not provide any warranties of any kind regarding any information contained within. In no event shall the United States Government or its contractors or subcontractors be liable for any damages, including, but not limited to, direct, indirect, special, or consequential damages and including damages based on any negligence of the United States Government or its contractors or subcontractors, arising out of, resulting from, or in any way connected with this report, whether or not based upon warranty, contract, tort, or otherwise, whether or not injury was sustained from, or arose out of the results of, or reliance upon the report.
DOE does not endorse any commercial product or service, including the subject of the analysis in this report. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply their endorsement, recommendation, or favoring by the agencies.
The display of the DOE official seal or other visual identities on this report shall not be interpreted to provide the recipient organization authorization to use the official seal, insignia, or other visual identities of the Department. The DOE insignia or other visual identities shall not be used in any manner to imply endorsement of any commercial product or activity by DOE or the United States Government. Use of the DOE seal without proper authorization violates federal law (e.g., 18 U.S.C. §§ 506, 701, 1017), and is against DOE policies governing usage of their seal.
This report represents the results of an evaluation using the Buildings Cybersecurity Capability Maturity Model (B-C2M2). The B-C2M2 evaluation is designed to assist organizations in identifying specific areas to strengthen their cybersecurity program, prioritize cybersecurity actions and investments, and maintain the desired level of security throughout the IT systems life cycle.
The scope defined for this evaluation includes the following:
This evaluation examined ten critical cyber domains for a federal facility with a focus on buildings controls
The results presented in this report are based on participant responses to B-C2M2 Evaluation questions. For the purposes of this evaluation, responses to evaluation questions are considered valid and accurate. The evaluation process did not include document reviews, observation of work, or an examination of security controls in place to support the evaluated function.
The B-C2M2 arises from a combination of existing cybersecurity standards, frameworks, programs, and initiatives. The B-C2M2 provides flexible guidance to help organizations develop and improve their cybersecurity capabilities. As a result, the B-C2M2 practices tend to be at a high level of abstraction, so that they can be interpreted for organizations of various structures and sizes.
The B-C2M2 is organized into 10 domains. Each domain is a logical grouping of cybersecurity practices. The practices within a domain are grouped by objective—target achievements that support the domain. Within each objective, the practices are ordered by MIL.
The following sections include additional information about the domains and the MILs.
Each of the B-C2M2's 10 domains contains a structured set of cybersecurity practices. Each set of practices represents the activities an organization can perform to establish and mature capability in the domain. For example, the Risk Management domain is a group of practices that an organization can perform to establish and mature cybersecurity risk management capability.
For each domain, the B-C2M2 provides a purpose statement, which is a high-level summary of the intent of the domain. The purpose statement offers context for interpreting the practices in the domain. The practices within each domain are organized into objectives, which represent achievements that support the domain. For example, the Risk Management domain comprises three objectives:
Each of the objectives in a domain comprises a set of practices, which are ordered by MIL. Figure 2.1 depticts the architecture of the B-C2M2.Figure 2.1: B-C2M2 Architecture
A brief description of the 10 domains follows in the order in which they appear in the B-C2M2.
Establish, operate, and maintain an enterprise cybersecurity risk management program to identify, analyze, and mitigate cybersecurity risk to the organization, including its business units, subsidiaries, related interconnected infrastructure, and stakeholders.
Manage the organization's information technology (IT) and operations technology (OT) assets, including both hardware and software, commensurate with the risk to critical infrastructure and organizational objectives.
Create and manage identities for entities that may be granted logical or physical access to the organization's assets. Control access to the organization's assets, commensurate with the risk to critical infrastructure and organizational objectives.
Establish and maintain plans, procedures, and technologies to detect, identify, analyze, manage, and respond to cybersecurity threats and vulnerabilities, commensurate with the risk to the organization's infrastructure (e.g., critical, IT, operational) and organizational objectives.
Establish and maintain activities and technologies to collect, analyze, alarm, present, and use operational and cybersecurity information, including status and summary information from the other B-C2M2 domains, to form a common operating picture (COP).
Establish and maintain relationships with internal and external entities to collect and provide cybersecurity information, including threats and vulnerabilities, to reduce risks and to increase operational resilience, commensurate with the risk to critical infrastructure and organizational objectives.
Establish and maintain plans, procedures, and technologies to detect, analyze, and respond to cybersecurity events and to sustain operations throughout a cybersecurity event, commensurate with the risk to critical infrastructure and organizational objectives.
Establish and maintain controls to manage the cybersecurity risks associated with services and assets that are dependent on external entities, commensurate with the risk to critical infrastructure and organizational objectives.
Establish and maintain plans, procedures, technologies, and controls to create a culture of cybersecurity and to ensure the ongoing suitability and competence of personnel, commensurate with the risk to critical infrastructure and organizational objectives.
Establish and maintain an enterprise cybersecurity program that provides governance, strategic planning, and sponsorship for the organization's cybersecurity activities in a manner that aligns cybersecurity objectives with the organization's strategic objectives and the risk to critical infrastructure.
The B-C2M2 defines four maturity indicator levels, MIL0 through MIL3, which apply independently to each domain in the B-C2M2.
Four aspects of the MILs are important for understanding and applying the B-C2M2:
The B-C2M2 includes 10 domains, or logical groupings of cybersecurity practices. A description of the each domain is provided in Section 2.1. Domains. This section provides a summary of MIL scores and answer input by MIL for each of the 10 domains included in the B-C2M2. See Appendix A: Evaluation Scoring Process for a detailed explanation of the scoring process and Section 5. Using the Evaluation Results for further detail regarding interpretation of evaluation results.
|Fully Implemented||Largely Implemented||Partially Implemented||Not Implemented|
This section provides the level of implementation (i.e., Fully Implemented, Largely Implemented, Partially Implemented, and Not Implemented) input to the Evaluation Survey for each B-C2M2 practice by domain, objective, and MIL. See Appendix A: Evaluation Scoring Process for a detailed explanation of the scoring process and Section 5. Using the Evaluation Results for further detail regarding evaluation results.
The B-C2M2 is meant to be used by an organization to evaluate its cybersecurity capabilities consistently, to communicate its capability levels in meaningful terms, and to inform the prioritization of its cybersecurity investments. Figure 5.1 summarizes the recommended approach for using the B-C2M2. An organization performs an evaluation against the B-C2M2, uses that evaluation to identify gaps in capability, prioritizes those gaps and develops plans to address them, and finally implements plans to address the gaps. As plans are implemented, business objectives change, and the risk environment evolves, the process is repeated.Figure 5.1: Recommended Approach for Using the B-C2M2
To aid in the analysis of identified gaps, survey questions that were recorded as either "Partially Implemented" or "Not Implemented" are consolidated in Section 5.1-Summary of Identified Gaps.
Table 5.1 presents a more detailed process for using evaluation results.Table 5.1: Detailed Process for Using the Evaluation Results
Note: For further detail regarding activities in the table above, see the B-C2M2 Version 1.1.
The evaluation questionnaire answer options are explained in more detail in the following table:Table A.1: Evaluation Answer Scale
Achieving a specific MIL for a given domain in the B-C2M2 requires the following:
|Fully Implemented||Largely Implemented||Partially Implemented||Not Implemented|
|Maturity Indicator Level|
|All||MIL 1||MIL 2||MIL 3|