← Back to C2M2 Portal

How to use this guide

For each domain, this guide lists the evidence types most commonly needed to demonstrate practice implementation at each MIL level. Evidence at MIL 2 and MIL 3 must build on MIL 1 evidence — assessors look for artifacts showing that practices are not only performed, but planned, tracked, reviewed, and improved.

🗂️ASSETAsset, Change, and Configuration Management
MILEvidence TypeDescription / ExamplesOwner
MIL 1IT Asset InventorySpreadsheet, CMDB, or tool export listing all IT hardware and software assetsIT Admin
MIL 1OT Asset InventoryICS/SCADA device list, PLC inventory, or OT network diagram with device listingOT/ICS Team
MIL 1Change RecordsTicket records, email threads, or change logs showing changes were reviewed and testedChange Manager
MIL 1Baseline Configuration DocsSystem hardening guides, CIS Benchmarks applied, group policy exportsIT Admin
MIL 2Asset Management PolicyDocumented policy defining who owns asset inventory, how often it's updated, and prioritization criteriaISSO
MIL 2Change Management ProcedureFormal change control process document with approval workflow and rollback planChange Manager
MIL 2Configuration Management PlanWritten CM plan with baseline definitions, deviation tracking, and exception processIT Admin
MIL 3Asset Program Review RecordsMeeting minutes, after-action reports, or memos showing periodic review of asset management programCISO / Leadership
MIL 3Lessons Learned DocumentationChange post-mortems, CM improvement tracking, updated procedures based on past issuesChange Manager
🛡️THREATThreat and Vulnerability Management
MILEvidence TypeDescription / ExamplesOwner
MIL 1Vulnerability Scan ReportsOutput from Nessus, Qualys, OpenVAS, or similar tools showing scan was performedIT Security
MIL 1Threat Intelligence SubscriptionsICS-CERT alerts, AIS feeds, MS-ISAC or E-ISAC membership recordsSecurity Analyst
MIL 1Vulnerability Remediation RecordsPatching records, ticket closures, or configuration changes made to address findingsIT Admin
MIL 2Vulnerability Management Policy/ProcedureWritten policy defining scanning schedule, risk rating methodology, and remediation SLAsISSO
MIL 2Vulnerability Tracking RegisterSpreadsheet or ticketing system showing open/closed vulnerabilities with target remediation datesSecurity Analyst
MIL 2Threat Analysis RecordsDocumented threat assessments, risk-ranked threat lists, or threat model outputsSecurity Team
MIL 3Program Review MinutesPeriodic vulnerability and threat program reviews with leadership, showing continuous improvement actionsCISO
MIL 3Threat Intelligence Sharing RecordsEvidence of bi-directional sharing with sector ISACs, peer organizations, or government partnersSecurity Team
🔑ACCESSIdentity and Access Management
MILEvidence TypeDescription / ExamplesOwner
MIL 1User Account ListAD/LDAP export or user directory showing active accounts with assigned rolesIT Admin
MIL 1Access Revocation RecordsTerminated employee offboarding checklists showing accounts were disabledHR / IT Admin
MIL 1Privileged Account ListList of accounts with admin/root/service privileges and their justificationIT Admin
MIL 2IAM PolicyDocumented access control policy defining least privilege, MFA requirements, and review scheduleISSO
MIL 2MFA Configuration RecordsScreenshots or policy exports showing MFA is enforced on privileged and remote access accountsIT Admin
MIL 2Access Review RecordsPeriodic access certification records showing who reviewed accounts and what was approved/revokedIT Admin / ISSO
MIL 3IAM Program Review RecordsLeadership-level review of access management program, improvement tracking, metricsCISO
🚨RESPONSEEvent and Incident Response, Continuity of Operations
MILEvidence TypeDescription / ExamplesOwner
MIL 1Incident LogLog or ticketing system records showing past incidents were documented and addressedSecurity Team
MIL 1Backup RecordsBackup completion logs, cloud backup configurations, or tape rotation schedulesIT Admin
MIL 2Incident Response Plan (IRP)Written IRP with detection, escalation, containment, eradication, and recovery proceduresISSO / Security Team
MIL 2IRP Training RecordsTraining completion certificates, tabletop exercise attendance recordsHR / Security Team
MIL 2Continuity of Operations Plan (COOP)Written COOP or BCP identifying critical functions and recovery time objectives (RTOs)Business Continuity
MIL 2Backup Restore Test RecordsRecords showing backups were tested and recovery was successfulIT Admin
MIL 3Post-Incident Review ReportsAfter-action reports from real incidents or exercises documenting lessons learned and improvements madeISSO / CISO
MIL 3COOP Exercise ResultsFull-scale or tabletop exercise results with gaps identified and improvement planBusiness Continuity
👷WORKFORCEWorkforce Management
MILEvidence TypeDescription / ExamplesOwner
MIL 1Security Awareness Training RecordsLMS completion records, KnowBe4/Proofpoint reports, sign-in sheets for in-person trainingHR / Security
MIL 1Role Assignment RecordsJob descriptions, responsibility matrices (RACI), or org charts showing cybersecurity role assignmentsHR / CISO
MIL 1Personnel Screening RecordsBackground check completion logs, signed AUPs, or reference check documentationHR
MIL 2Workforce Management PolicyWritten policy covering hiring, training, roles, and termination in a cybersecurity contextHR / ISSO
MIL 2Training PlanAnnual training calendar, course catalog with role assignments, training completion trackingHR / Security
MIL 3Training Effectiveness ReportsPhishing simulation results, quiz scores, post-training assessments with improvement trackingSecurity Team
MIL 3Workforce Program ReviewAnnual review of workforce cybersecurity program with leadership, showing improvements madeCISO / HR