Vaatimuskehikkoon sisältyvät vaatimukset

10.1 (MIL2)
C2M2

Establish Cybersecurity Program Strategy

10.1 (MIL3)
C2M2

Establish Cybersecurity Program Strategy

10.2
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL1)
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL2)
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL3)
C2M2

Establish and Maintain Cybersecurity Program

10.3
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL1)
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL2)
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL3)
C2M2

Management Activities for the PROGRAM domain

2
C2M2

Threat and Vulnerability Management (THREAT)

2.1
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL1)
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL2)
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL3)
C2M2

Reduce Cybersecurity Vulnerabilities

2.2
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL1)
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL2)
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL3)
C2M2

Respond to Threats and Share Threat Information

2.3
C2M2

Management Activities for the THREAT domain

2.3 (MIL1)
C2M2

Management Activities for the THREAT domain

2.3 (MIL2)
C2M2

Management Activities for the THREAT domain

2.3 (MIL3)
C2M2

Management Activities for the THREAT domain

3
C2M2

Risk Management (RISK)

Cybersecurity Capability Maturity Model (C2M2)

The Cybersecurity Capability Maturity Model (C2M2) helps organizations evaluate their cybersecurity capabilities and optimize security investments.

It uses a set of industry-vetted cybersecurity practices focused on both information technology (IT) and operations technology (OT) assets and environments.

Vaatimuskehikon teema-alueet

No items found.