ComplianceFeatured

AESCSF v2, C2M2 v2.1, and NIST CSF: Understanding the Framework Relationships

A detailed comparison of AESCSF v2 and C2M2 v2.1, examining their shared heritage, structural differences, and how NIST CSF functions map across both frameworks for Australian energy sector organisations.

12 min read

Australian energy sector organisations navigating cyber security compliance often encounter three interconnected frameworks: the Australian Energy Sector Cyber Security Framework (AESCSF), the US Department of Energy's Cybersecurity Capability Maturity Model (C2M2), and the NIST Cybersecurity Framework (CSF). Understanding how these frameworks relate to each other is essential for effective implementation and for communicating with stakeholders who may reference different frameworks. AESCSF v2 is built upon C2M2, adapting its domain-based maturity model for the Australian regulatory context. Meanwhile, both frameworks provide crosswalks to NIST CSF, which uses a function-based approach that has become a common language for cyber security discussions globally. This article provides a detailed comparison of AESCSF v2 and C2M2 v2.1, examines their structural differences, and maps how NIST CSF v2.0 functions align across both frameworks.

Framework Heritage and Purpose

Understanding the origins of each framework explains their design choices and intended use cases.

C2M2 v2.1 was developed by the US Department of Energy in partnership with the Department of Homeland Security and industry stakeholders. First released in 2014 and updated to version 2.1 in 2022, C2M2 was purpose-built for the energy sector to help organisations assess and improve their cyber security capabilities. Its maturity model approach recognises that security improvement is progressive and allows organisations to benchmark their current state against defined capability levels.

AESCSF v2 was developed by the Australian Energy Market Operator (AEMO) in collaboration with the Australian Cyber Security Centre (ACSC) and energy sector participants. AEMO explicitly adopted C2M2 as the foundation for AESCSF, adapting it for Australian regulatory requirements, terminology, and the specific context of Australian electricity and gas networks. AESCSF v2 aligns with Security of Critical Infrastructure Act (SOCI Act) obligations and integrates with Australian government security guidance.

NIST CSF v2.0 takes a different approach. Rather than a maturity model, it provides a taxonomy of security outcomes organised into functions. Originally released in 2014 and significantly updated to version 2.0 in 2024, NIST CSF has become a de facto standard for discussing cyber security capabilities across industries. Its function-based structure (Govern, Identify, Protect, Detect, Respond, Recover) provides a high-level view that complements the detailed domain structures of C2M2 and AESCSF.

Structural Comparison: Domains vs Functions

The most significant difference between the frameworks is their organising structure.

C2M2 v2.1 and AESCSF v2: Domain-Based Structure

Both C2M2 and AESCSF organise capabilities into ten domains, each addressing a specific aspect of cyber security management:

DomainAbbreviationFocus Area
Asset, Change, and Configuration ManagementASSETIT and OT asset lifecycle management
Threat and Vulnerability ManagementTHREATThreat detection, vulnerability identification and remediation
Risk ManagementRISKEnterprise cyber security risk program
Identity and Access ManagementACCESSIdentity lifecycle and access control
Situational AwarenessSITUATIONOperational and security monitoring
Event and Incident Response, Continuity of OperationsRESPONSEDetection, response, and recovery capabilities
Third-Party Risk ManagementTHIRD-PARTIESSupply chain and vendor security
Workforce ManagementWORKFORCESecurity culture, training, and personnel security
Cybersecurity ArchitectureARCHITECTURESecurity design and implementation
Cybersecurity Program ManagementPROGRAMGovernance, strategy, and program oversight

Within each domain, both frameworks define practices at increasing maturity levels. C2M2 uses Maturity Indicator Levels (MIL) 0-3, while AESCSF uses Security Profile (SP) levels 1-3 with similar definitions.

NIST CSF v2.0: Function-Based Structure

NIST CSF v2.0 organises outcomes into six functions:

FunctionFocus Area
Govern (GV)Cyber security risk management strategy, expectations, and policy
Identify (ID)Understanding assets, risks, and improvement opportunities
Protect (PR)Safeguards to manage cyber security risks
Detect (DE)Finding and analysing cyber security attacks and compromises
Respond (RS)Taking action regarding detected incidents
Recover (RC)Restoring capabilities and services after incidents

Each function contains categories and subcategories that describe specific outcomes. Unlike C2M2/AESCSF, NIST CSF does not prescribe maturity levels - it describes what should be achieved, not how mature the implementation should be.

Mapping NIST CSF Functions to C2M2/AESCSF Domains

NIST CSF functions do not map one-to-one with C2M2/AESCSF domains. Each function spans multiple domains, and each domain contributes to multiple functions. Understanding these mappings helps organisations translate between framework languages.

GOVERN Function Mappings

The Govern function, added in NIST CSF v2.0, addresses organisational context, risk management strategy, roles and responsibilities, policies, and oversight. It maps primarily to:

  • PROGRAM - Cyber security strategy, governance, and sponsorship
  • RISK - Risk management program and risk appetite
  • WORKFORCE - Roles, responsibilities, and accountability

IDENTIFY Function Mappings

The Identify function covers asset management, risk assessment, and improvement. It maps to:

  • ASSET - Asset inventory, classification, and configuration management
  • RISK - Risk identification and assessment
  • THREAT - Threat identification and vulnerability assessment
  • THIRD-PARTIES - Supply chain risk identification

PROTECT Function Mappings

The Protect function addresses safeguards including access control, awareness training, data security, and protective technology. It maps to:

  • ACCESS - Identity management and access control
  • ARCHITECTURE - Security architecture and protective technologies
  • WORKFORCE - Awareness and training programs
  • ASSET - Configuration management and change control

DETECT Function Mappings

The Detect function covers continuous monitoring, anomaly detection, and detection processes. It maps to:

  • SITUATION - Security monitoring and situational awareness
  • THREAT - Threat detection and analysis
  • RESPONSE - Event detection capabilities

RESPOND Function Mappings

The Respond function addresses incident response planning, communications, analysis, mitigation, and improvements. It maps to:

  • RESPONSE - Incident response and mitigation
  • SITUATION - Incident-related communications
  • PROGRAM - Response improvement and lessons learned

RECOVER Function Mappings

The Recover function covers recovery planning, improvements, and communications. It maps to:

  • RESPONSE - Continuity of operations and recovery
  • PROGRAM - Recovery improvements
  • SITUATION - Recovery communications

Key Differences Between AESCSF v2 and C2M2 v2.1

While AESCSF is based on C2M2, there are meaningful differences that Australian organisations should understand.

Regulatory Alignment

AESCSF v2 explicitly aligns with Australian regulatory requirements:

  • Security of Critical Infrastructure Act (SOCI Act) obligations
  • Critical Infrastructure Risk Management Program (CIRMP) requirements
  • Australian Cyber Security Centre (ACSC) guidance
  • Information Security Manual (ISM) mappings

C2M2 v2.1 aligns with US regulatory frameworks including NERC CIP for the electricity subsector, but these are not directly applicable in Australia.

Terminology and Context

AESCSF uses Australian terminology and references Australian energy market structures. References to regulators, reporting requirements, and compliance obligations reflect the Australian context. C2M2 uses US terminology and references US regulatory bodies.

Maturity Level Definitions

While both frameworks use similar maturity scales, the specific indicators and evidence requirements may differ:

LevelC2M2 v2.1AESCSF v2
0/Not PerformedMIL 0 - Practices not performedNot explicitly defined
1/InitialMIL 1 - Initial practices, may be ad hocSP 1 - Initial/ad hoc practices
2/ManagedMIL 2 - Practices documented, stakeholders identifiedSP 2 - Documented and managed
3/OptimisedMIL 3 - Activities guided by policy, periodically reviewedSP 3 - Optimised and continuously improving

Assessment and Reporting

AESCSF includes specific guidance for annual self-assessments aligned with AEMO's reporting requirements. Organisations report their maturity levels across domains, with results used for sector-wide benchmarking and to demonstrate SOCI Act compliance. C2M2 assessments are self-directed without mandated reporting to regulators.

Practice Descriptions

Some practice descriptions in AESCSF have been modified from C2M2 to reflect Australian requirements or to align with ISM controls. When implementing AESCSF, always reference the AESCSF documentation rather than assuming C2M2 practices apply directly.

Practical Framework Selection and Integration

For Australian energy sector organisations, the question is not which framework to choose -AESCSF is the mandated approach for SOCI Act compliance. The question is how to integrate these frameworks effectively.

Primary Framework: AESCSF v2

AESCSF should be the primary framework for:

  • Annual maturity assessments
  • SOCI Act CIRMP compliance demonstration
  • Reporting to AEMO and regulators
  • Internal capability benchmarking

Reference Framework: C2M2 v2.1

C2M2 remains valuable as a reference for:

  • Understanding the theoretical foundation of AESCSF
  • Accessing DOE implementation guidance and resources
  • Engaging with international partners or parent companies using C2M2
  • Detailed practice implementation guidance (where AESCSF and C2M2 align)

Communication Framework: NIST CSF v2.0

NIST CSF is useful for:

  • Board and executive communications (simpler function-based structure)
  • Discussions with non-energy-sector stakeholders
  • Mapping to other frameworks (ISO 27001, Essential Eight)
  • Strategic planning and capability visualisation

Building a Unified Control Framework

Organisations managing multiple compliance obligations benefit from a unified control framework that maps:

  • AESCSF practices (for energy sector compliance)
  • NIST CSF outcomes (for communication and mapping)
  • ISM controls (for government security requirements)
  • ISO 27001 controls (for certification requirements)

This unified view prevents duplication of effort and ensures controls implemented for one framework satisfy requirements across multiple frameworks where applicable.

Implementation Considerations

When implementing across these frameworks, consider the following practical guidance.

Start with AESCSF Domain Assessment

Begin by assessing current maturity across all ten AESCSF domains. This provides the baseline for compliance reporting and identifies priority improvement areas. Use the AESCSF self-assessment toolkit provided by AEMO for consistency with sector benchmarks.

Map to NIST CSF for Gap Visualisation

Once you have domain-level maturity scores, map them to NIST CSF functions to identify functional gaps. Low maturity in the ASSET and RISK domains will manifest as gaps in the Identify function. Low maturity in SITUATION and THREAT domains indicates Detect function gaps. This functional view can be more intuitive for non-specialist stakeholders.

Use C2M2 Resources for Implementation Guidance

The DOE provides extensive implementation guidance for C2M2, including practice implementation guides and example evidence. Where AESCSF practices align with C2M2 (which is most cases), these resources can inform implementation approaches. Always verify applicability to AESCSF requirements before applying C2M2 guidance directly.

Consider OT-Specific Requirements

All three frameworks recognise IT and OT environments require different approaches. AESCSF and C2M2, designed for energy sector use, have stronger OT-specific guidance than generic NIST CSF. When implementing controls in OT environments, prioritise AESCSF/C2M2 practice guidance over NIST CSF subcategories.

Plan for Framework Evolution

Frameworks evolve over time. NIST CSF v2.0 added the Govern function in 2024. C2M2 v2.1 updated practices in 2022. AESCSF releases periodic updates aligned with regulatory changes. Build flexibility into compliance programs to accommodate framework updates without complete redesign.

Framework Crosswalk Summary

The following summary shows how the three frameworks interrelate at a high level.

AESCSF/C2M2 Domains → NIST CSF Functions

DomainPrimary NIST CSF Functions
ASSETIdentify, Protect
THREATIdentify, Detect
RISKGovern, Identify
ACCESSProtect
SITUATIONDetect, Respond, Recover
RESPONSERespond, Recover
THIRD-PARTIESGovern, Identify
WORKFORCEGovern, Protect
ARCHITECTUREProtect
PROGRAMGovern

NIST CSF Functions → AESCSF/C2M2 Domains

FunctionContributing Domains
GovernPROGRAM, RISK, WORKFORCE, THIRD-PARTIES
IdentifyASSET, RISK, THREAT, THIRD-PARTIES
ProtectACCESS, ARCHITECTURE, WORKFORCE, ASSET
DetectSITUATION, THREAT, RESPONSE
RespondRESPONSE, SITUATION, PROGRAM
RecoverRESPONSE, PROGRAM, SITUATION

These mappings are directional guides, not precise equivalences. Detailed control-level mapping requires analysis of specific practices and subcategories, which AEMO provides in the AESCSF documentation.

Conclusion

AESCSF v2, C2M2 v2.1, and NIST CSF v2.0 serve complementary purposes for Australian energy sector organisations. AESCSF provides the mandated compliance framework, built on C2M2's proven maturity model and adapted for Australian regulatory requirements. NIST CSF provides a communication layer and crosswalk to other frameworks. Understanding how these frameworks relate - the ir shared heritage, structural differences, and mapping relationships - enables organisations to implement effective cyber security programs that satisfy regulatory obligations while communicating effectively with diverse stakeholders. The key is using each framework for its strengths: AESCSF for compliance and assessment, C2M2 for implementation guidance, and NIST CSF for communication and integration with broader security programs.

Need help navigating framework compliance?

Our team has deep experience implementing AESCSF, understanding its C2M2 foundations, and mapping across frameworks for Australian energy sector organisations.