Skip to main content

PNNL

  • About
  • News & Media
  • Careers
  • Events
  • Research
    • Scientific Discovery
      • Biology
        • Chemical Biology
        • Computational Biology
        • Ecosystem Science
        • Human Health
          • Cancer Biology
          • Exposure Science & Pathogen Biology
        • Integrative Omics
          • Advanced Metabolomics
          • Chemical Biology
          • Mass Spectrometry-Based Measurement Technologies
          • Spatial and Single-Cell Proteomics
          • Structural Biology
        • Microbiome Science
          • Biofuels & Bioproducts
          • Human Microbiome
          • Soil Microbiome
          • Synthetic Biology
        • Predictive Phenomics
      • Chemistry
        • Computational Chemistry
        • Chemical Separations
        • Chemical Physics
        • Catalysis
      • Earth & Coastal Sciences
        • Global Change
        • Atmospheric Science
          • Atmospheric Aerosols
          • Human-Earth System Interactions
          • Modeling Earth Systems
        • Coastal Science
        • Ecosystem Science
        • Subsurface Science
        • Terrestrial Aquatics
      • Materials Sciences
        • Materials in Extreme Environments
        • Precision Materials by Design
        • Science of Interfaces
        • Solid Phase Processing
          • Cold Spray
          • Friction Stir Welding & Processing
          • ShAPE
      • Nuclear & Particle Physics
        • Dark Matter
        • Flavor Physics
        • Fusion Energy Science
        • Neutrino Physics
      • Quantum Information Sciences
    • Energy Resiliency
      • Electric Grid Modernization
        • Emergency Response
        • Grid Analytics
          • AGM Program
          • Tools and Capabilities
        • Grid Architecture
        • Grid Cybersecurity
        • Grid Energy Storage
        • Grid Resilience and Decarbonization
          • Earth System Modeling
          • Energy System Modeling
        • Transmission
        • Distribution
      • Energy Efficiency
        • Appliance and Equipment Standards
        • Building Energy Codes
        • Building Technologies
          • Advanced Building Controls
          • Advanced Lighting
          • Building-Grid Integration
        • Building and Grid Modeling
        • Commercial Buildings
        • Federal Buildings
          • Federal Performance Optimization
          • Resilience and Security
        • Grid Resilience and Decarbonization
        • Residential Buildings
          • Building America Solution Center
          • Energy Efficient Technology Integration
          • Home Energy Score
        • Energy Efficient Technology Integration
      • Energy Storage
        • Electrochemical Energy Storage
        • Flexible Loads and Generation
        • Grid Integration, Controls, and Architecture
        • Regulation, Policy, and Valuation
        • Science Supporting Energy Storage
        • Chemical Energy Storage
      • Environmental Management
        • Waste Processing
        • Radiation Measurement
        • Environmental Remediation
      • Fossil Energy
        • Subsurface Energy Systems
        • Carbon Management
          • Carbon Capture
          • Carbon Storage
          • Carbon Utilization
        • Advanced Hydrocarbon Conversion
      • Nuclear Energy
        • Fuel Cycle Research
        • Advanced Reactors
        • Reactor Operations
        • Reactor Licensing
      • Renewable Energy
        • Solar Energy
        • Wind Energy
          • Wind Resource Characterization
          • Wildlife and Wind
          • Community Values and Ocean Co-Use
          • Wind Systems Integration
          • Wind Data Management
          • Distributed Wind
        • Marine Energy
          • Environmental Monitoring for Marine Energy
          • Marine Biofouling and Corrosion
          • Marine Energy Resource Characterization
          • Testing for Marine Energy
          • The Blue Economy
        • Hydropower
          • Environmental Performance of Hydropower
          • Hydropower Cybersecurity and Digitalization
          • Hydropower and the Electric Grid
          • Materials Science for Hydropower
          • Pumped Storage Hydropower
          • Water + Hydropower Planning
        • Grid Integration of Renewable Energy
        • Geothermal Energy
      • Transportation
        • Bioenergy Technologies
          • Algal Biofuels
          • Aviation Biofuels
          • Waste-to-Energy and Products
        • Hydrogen & Fuel Cells
        • Vehicle Technologies
          • Emission Control
          • Energy-Efficient Mobility Systems
          • Lightweight Materials
          • Vehicle Electrification
          • Vehicle Grid Integration
    • National Security
      • Chemical & Biothreat Signatures
        • Contraband Detection
        • Pathogen Science & Detection
        • Explosives Detection
        • Threat-Agnostic Biodefense
      • Cybersecurity
        • Discovery and Insight
        • Proactive Defense
        • Trusted Systems
      • Nuclear Material Science
      • Nuclear Nonproliferation
        • Radiological & Nuclear Detection
        • Nuclear Forensics
        • Ultra-Sensitive Nuclear Measurements
        • Nuclear Explosion Monitoring
        • Global Nuclear & Radiological Security
      • Stakeholder Engagement
        • Disaster Recovery
        • Global Collaborations
        • Legislative and Regulatory Analysis
        • Technical Training
      • Systems Integration & Deployment
        • Additive Manufacturing
        • Deployed Technologies
        • Rapid Prototyping
        • Systems Engineering
      • Threat Analysis
        • Advanced Wireless Security
          • 5G Security
          • RF Signal Detection & Exploitation
        • Grid Resilience and Decarbonization
        • Internet of Things
        • Maritime Security
        • Millimeter Wave
        • Mission Risk and Resilience
    • Data Science & Computing
      • Artificial Intelligence
      • Graph and Data Analytics
      • Software Engineering
      • Computational Mathematics & Statistics
      • Future Computing Technologies
        • Adaptive Autonomous Systems
      • Visual Analytics
    • Publications & Reports
    • Featured Research
  • People
    • Inventors
    • Lab Leadership
    • Lab Fellows
    • Staff Accomplishments
  • Partner with PNNL
    • Education
      • Undergraduate Students
      • Graduate Students
      • Post-graduate Students
      • University Faculty
      • University Partnerships
      • K-12 Educators and Students
      • STEM Education
        • STEM Workforce Development
        • STEM Outreach
        • Meet the Team
      • Internships
    • Community
      • Regional Impact
      • Philanthropy
      • Volunteering
    • Industry
      • Available Technologies
      • Industry
      • Industry Partnerships
      • Licensing & Technology Transfer
      • Entrepreneurial Leave
      • Visual Intellectual Property Search (VIPS)
  • Facilities & Centers
    • All Facilities
      • Atmospheric Radiation Measurement User Facility
      • Electricity Infrastructure Operations Center
      • Energy Sciences Center
      • Environmental Molecular Sciences Laboratory
      • Grid Storage Launchpad
      • Institute for Integrated Catalysis
      • Interdiction Technology and Integration Laboratory
      • PNNL Portland Research Center
      • PNNL Seattle Research Center
      • PNNL-Sequim (Marine and Coastal Research)
      • Radiochemical Processing Laboratory
      • Shallow Underground Laboratory

Cybersecurity
Maturity
Models

A maturity model provides a set of indicators that represent capability and progression in a particular discipline.  A maturity model provides a benchmark against which an organization can evaluate its current level of performance and, if warranted, set programmatic goals and priorities for improvement. The underlying principle is that not all organizations need to have the same maturity in a given discipline. Organizations facing high risks and with available resources typically require a more mature program than organizations that are facing low risk or are just starting to develop their capability.  

Icon images showing the progression from crawl to walk to run

The human mobility analogy in a maturity model is the process of first learning to crawl, then walk, and then run.  Young children don’t jump from crawlers to runners overnight, they need to develop their muscles and coordination over time and with practice to achieve their mobility goals. Similarly, organizations need to first develop a core capability that provides some level of performance before they work to grow their capabilities in a thoughtful, systematic manner.

PNNL scientists and researchers have developed a robust portfolio of maturity models that are free and available for many organizations to use. Our core models focus on cybersecurity applications, but some focus on other programmatic issues, such as energy infrastructure resilience, chemical facility security, supply chain security and the secure design and development of software. Though the primary audience for these tools is the energy sector many of these tools are applicable to multiple sectors.

For example, a cybersecurity maturity model assesses the maturity of an organization’s cybersecurity program and identifies areas that could be improved to address the continually evolving cyber threat environment. This type of model helps organizations improve their cybersecurity posture, develop a roadmap that prioritizes improvements, and helps subject matter experts communicate effectively with senior management to obtain support for risk-based cybersecurity improvements.

Maturity models can used regardless of size, type, or industry of the organizations. The models can focus on a broad area of interest (e.g., cybersecurity or resilience capabilities) across an entire organization, they can examine programmatic capabilities at a single facility, or they focus on a component of process operations.  

Maturity models in PNNL’s portfolio are based on the Cybersecurity Capability Maturity Model (C2M2) framework. The C2M2 framework was developed through a public-private partnership effort sponsored by the U.S. Department of Energy. Work on the C2M2 began in 2012 and was conducted to improve electricity subsector cybersecurity capabilities and to better understand the cybersecurity posture of the electric power grid. Today the C2M2 and other PNNL maturity models are available for online access on the model’s webpage. The on-line versions of the models are provided as HTML-based software tools. The tools are designed to be easy to use and provide security and privacy for users. Extensive training materials are provided on each model’s “Resources” webpages and typically includes a general model user guide, guidance on how to organize and facilitate a self-assessment, and a step-by-step instruction manual for the tools. 

Security and privacy are important features of our online tools and were a “must have” specified by our industry partners. All data entered by the user and all model output reports are generated and stored on the user’s computer. No user data are ever communicated to the model server. If a user requests an off-line version of our tools, our team will provide that product.  

The models are used by thousands of people across a diverse range of countries around the globe. We can use website traffic analysis tools to determine the frequency with which our tools and support products are accessed and other generic information, but no information can be acquired about specific users and the information they enter into the tools.

Multiple computer screens showing text

We invite organizations to access and make use of our maturity models (summarized below) to assess their programmatic maturity in a variety of areas. We value user feedback on the models. You can share your feedback and comments with the PNNL cybersecurity team.

Featured Maturity Models

C2M2 logo with black text and blue data bars
VIEW SITE 

The Cybersecurity Capability Maturity Model (C2M2) was developed to assess the maturity of a energy sector organization’s cybersecurity program (it is also used by other critical infrastructure sector).  The model can be used to identify areas where cost-effective enhancements can quickly improve cybersecurity programs.  The current version of the C2M2 (Version 2.1) was released in June 2022 and uses 356 practices to evaluate performance across 12domains.   Development work on the C2M2 began in 2012 and its original version and all subsequent major revisions have involved cooperative efforts by energy industry experts from a diverse group of public agencies, private institutes, and industry.  C2M2 work is sponsored by the U.S. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response (CESER).  The C2M2 website and tools are freely available in North America and around the world.

 


Purple text with purple data bars on a yellow background
VIEW SITE

The Cybersecurity Capability Maturity Model-Nuclear (C2M2-Nuclear) was developed to assess the maturity of a nuclear sector organization’s cybersecurity program.  This includes nuclear power plants, research reactors, nuclear fuel fabrication, nuclear waste processing and disposal, nuclear medicine facilities, and others.   C2M2-Nuclear is based on C2M2 Version 2.1 and uses 413 practices to evaluate performance across 12 domains.  The development and operation of C2M2-Nuclear is sponsored by the U.S. Department of Energy’s Office of International Nuclear Security (INS).  The C2M2-Nuclear is freely available to registered users.  A registration request can be submitted using the Register page on the C2M2-Nuclear webpage.

 


TRMM text in white with purple background and orange lightening bolt
VIEW SITE

The Transmission Resiliency Maturity Model (TRMM) is a tool for electricity transmission organizations to objectively evaluate and benchmark their current transmission resiliency policies, programs, and investments. The objective is to assist the transmission organization to target and prioritize improvements and enhance the overall resilience of the power grid. This U.S. Department of Energy-sponsored model was developed through a public-private partnership that included PNNL, Electric Power Research Institution, the North American Transmission Forum, and more than a dozen transmission utilities.

 


Black text with a blue and green icon representing buildings
VIEW SITE

The Facility Cybersecurity Framework (FCF) suite of maturity models provides tools to assess the cybersecurity maturity of facilities using an array of standards and guidance.  It includes, but is not limited to the following tools::

  • The FCF uses the National Institute of Standards and Technology (NIST) cybersecurity framework to help building and facility owners and operators assess and manage cybersecurity risks.
  • The FCF-Risk Management Framework (RMF) Hybrid  can perform a standard Management Framework (RMF_ assessment and generate both FCF and RMF compliance/maturity scores.
  • The F-C2M2 is an alternate presentation of the C2M2.  It allow organizations to assess their building or facility’s cybersecurity maturity using the C2M2 framework from within the FCF suite. 
  • The FCF-Primer enables the user to conduct a quick review of their facility’s security posture before committing resources to a full FCF assessment. The FCF-Primer can be used prior to an FCF assessment or to track enhancements during the post-assessment/gap-mitigation activities. 

The FCF includes an array of other tools including the:

  • Qualitative Risk Assessment (QRA) tool to assist facility owners and operators in performing risk-based asset management.
  • The FCF Cybersecurity Training Game provides dynamic, game-based cybersecurity training
  • The Mitigation of Externally Exposed Energy Delivery Systems (MEEDS) helps users securely identify potentially vulnerable devices that are inadvertently exposed to the public internet.

 


Models Undergoing Development or Testing

Black text with a blue and green icon representing a shield
VISIT SITE

The Secure Design and Development C2M2 (SD2-C2M2) is a tool that can be used by hardware, software, and system developers and integrators to assess their design and development practices and procedures against a set of best-practice concepts to determine the maturity level of their processes. The tool can then compare the maturity levels against a set of management derived levels to determine where improvements can be made. A new version of the SD2-C2M2 and a full suite of guides are being developed and password to access the SD2-C2M2 tool can be requested by through the SD2-C2M2 registration webpage. 

 


CSAM text with icon representing data and magnifying glass
VIEW SITE

The Chemical Security Assessment Model (CSAM) assists chemical facilities and laboratories in identifying the maturity of the chemical security program and to identify programmatic areas to strengthen to maintain a desired level of security. A prototype of the model was released in late 2022 and further enhancements are planned in late 2023. CSAM shares a website with the CLiCS model.

 


Black text with an orange honeycomb inspired icon
VIEW SITE

The Chemical Lifecycle and Supply Chain Security (CLiCS) Model assists organization in identifying the maturity of the chemical security program used to address the lifecycle security risks associated with hazardous and weaponization chemicals.  This model follows these chemicals of interest from their precursors, through management, storage, transportation, sale to customers, use, and eventual disposal.  CLiCS shares a website with the CSAM Tool.

 


 

Black text with an icon that looks like a little radio
 

The Supply Chain Security Maturity Model (SCSMM) is currently under development.  It will assess the maturity of an organization or facility’s supply chain security program.   It allows users to assess their programmatic performance in nine different domains important to supply chain security, including Supply Chain Threat, Vulnerability and Risk Management; Supplier Management; Procurement; Asset Delivery and Installation; Asset and Change Management; and Workforce Management.

 


Training Tools

The FCF Cybersecurity Training Game is designed for a spectrum of facility owners and operators. It provides dynamic, game-based cybersecurity training. Users pick a scenario and are then confronted with a series of real-world cyberattacks on their facility. Cybersecurity resources to thwart the attack are constrained to mimic real-world limitations. Attacks may impact both information and operational technology systems.

Contact

Those interested in learning more are encouraged to email our Maturity Modeling team at MaturityModels@pnnl.gov for the quickest response. 

 

Contact

Clifford Glantz
Chief Scientist and Project Manager
cliff.glantz@pnnl.gov
509-375-2166

Research topics

Cybersecurity
Grid Cybersecurity
Hydropower Cybersecurity and Digitalization

PNNL

  • Get in Touch
    • Contact
    • Careers
    • Doing Business
    • Environmental Reports
    • Security & Privacy
    • Vulnerability Disclosure Policy
  • Research
    • Scientific Discovery
    • Energy Resiliency
    • National Security
Subscribe to PNNL News
Department of Energy Logo Battelle Logo
Pacific Northwest National Laboratory (PNNL) is managed and operated by Battelle for the Department of Energy
  • YouTube
  • Facebook
  • X (formerly Twitter)
  • Instagram
  • LinkedIn