Organizational roles for a successful C2M2 self-evaluation and program
A successful C2M2 evaluation requires participation from across the organization. The following roles are typically involved in the self-evaluation process and ongoing cybersecurity program management.
R = Responsible | A = Accountable | C = Consulted | I = Informed
| Activity | Exec Sponsor | CISO | Facilitator | Domain Owners | IT Staff | OT Staff | HR |
|---|---|---|---|---|---|---|---|
| Set MIL targets and evaluation scope | A | R | C | C | I | I | I |
| Schedule and coordinate evaluation sessions | I | A | R | C | I | I | I |
| Collect domain-level evidence | I | A | C | R | R | R | R |
| Score practices in each domain | I | C | R | R | C | C | C |
| Develop gap analysis and POA&M | I | A | R | R | C | C | C |
| Present results to executive leadership | I | R | C | C | I | I | I |
| Implement POA&M remediation actions | I | A | C | R | R | R | R |
| Conduct annual program review (MIL 3) | C | R | R | C | I | I | I |