Threat Identification
The threat identification requirement means you must actively identify and document cybersecurity threats relevant to your organization’s environment, including IT, OT, and information assets. To operationalize it, stand up a repeatable intake-and-triage process, maintain a living threat register tied to assets and mission outcomes, and keep evidence that threats are reviewed and updated based on internal changes and external intelligence. (Cybersecurity Capability Maturity Model v2.1)
Key takeaways:
- Maintain a documented, current list of cybersecurity threats relevant to your IT, OT, and information assets. (Cybersecurity Capability Maturity Model v2.1)
- Make threat identification operational: defined owners, sources, cadence, triage criteria, and outputs that feed risk, controls, and incident readiness.
- Retain auditor-ready artifacts: threat register, meeting notes, intake sources, mapping to assets, and change logs.
Threat identification is the front end of almost every defensible cybersecurity program. If you cannot show how you identify threats relevant to your specific environment, you will struggle to justify security investments, prioritize remediation, or explain residual risk to leadership.
C2M2’s requirement is short, but it is operationally demanding: “Cybersecurity threats to the organization are identified and documented.” (Cybersecurity Capability Maturity Model v2.1) For an energy sector or critical infrastructure operator, that scope includes IT systems, OT environments, and information assets. (Cybersecurity Capability Maturity Model v2.1) The practical test is straightforward: can you produce a clear, maintained record of the threats you consider relevant, where those threats come from, and how your organization reviews and updates them as conditions change?
This page gives requirement-level implementation guidance you can execute quickly: who owns the process, what inputs to use, how to structure your documentation, what evidence to retain, and what auditors typically probe. It also includes a practical execution plan and common failure modes seen in real programs.
Regulatory text
Requirement (excerpt): “Cybersecurity threats to the organization are identified and documented.” (Cybersecurity Capability Maturity Model v2.1)
Operator interpretation (what you must do):
- Identify threats that matter to your organization, not generic lists. The intent is relevance to your operations, including threats to IT, OT, and information assets. (Cybersecurity Capability Maturity Model v2.1)
- Document those threats in a durable, reviewable format (a “threat register” or equivalent).
- Keep the documentation current enough to be credible, meaning it reflects your environment, your dependencies (including third parties), and changes in adversary activity that affect you.
C2M2 does not prescribe a specific tool, taxonomy, or intelligence provider. It does require that your program can point to a documented output and show it is part of normal operations. (Cybersecurity Capability Maturity Model v2.1)
Plain-English requirement: what “threat identification” means in practice
Threat identification is the disciplined activity of answering: “What could realistically harm our systems, operations, or information, and how would it happen?” Then you write it down in a format that others can act on.
A workable interpretation for most CCO/GRC teams:
- You maintain a living threat register with defined fields (threat, scenario, affected assets, likely entry points, potential impacts, existing mitigations, owner, review date).
- You source threats from both internal signals (incidents, near misses, change management, vulnerability findings) and external signals (sector advisories, vendor disclosures, threat intel).
- You refresh the threat register when your environment changes (new OT site, new remote access path, new third party integration) and on a recurring governance cycle.
Who it applies to (entity and operational context)
C2M2 positions this requirement for energy sector organizations and critical infrastructure operators. (Cybersecurity Capability Maturity Model v2.1) In practice, it applies to:
- Corporate IT: identity, endpoints, email, network, cloud services, enterprise applications, data platforms.
- OT / ICS: control systems, engineering workstations, historians, safety and reliability systems, remote access into OT, vendor maintenance channels.
- Information assets: operational data, schematics, configurations, customer data (if applicable), proprietary process data, and regulated records.
- Third-party dependencies: managed service providers, OEMs, SaaS platforms, cloud providers, telecom, field service contractors, integrators.
The operational context that triggers scrutiny is any environment where cyber events can affect availability, integrity, safety, reliability, or regulated reporting. For many operators, OT threats are the hardest part because the “impact” is operational, not just data loss.
What you actually need to do (step-by-step)
Step 1: Name the process owner and boundary
Assign an accountable owner (often Security/GRC) and define the scope:
- In-scope environments: IT, OT, and information assets. (Cybersecurity Capability Maturity Model v2.1)
- In-scope threat sources: internal findings, external intelligence, third-party disclosures.
- In-scope outputs: threat register + review artifacts.
Practical tip: If OT is in scope, make OT engineering a co-owner for OT threat scenarios. Otherwise, your register becomes IT-only and fails the “relevant to operations” test.
Step 2: Stand up a threat intake funnel (repeatable inputs)
Create a documented list of threat inputs and where they land. Common categories:
- Internal
- Incident postmortems and near-miss reports
- Vulnerability management trends
- Pen test / red team findings
- Change management (new connectivity, new assets, new remote access)
- Physical security and insider-risk referrals (where relevant)
- External
- Sector/government advisories (as applicable to your org)
- Vendor security advisories for products you run
- Threat intelligence reports relevant to your geography and industry
- Third-party notifications (breaches, critical vulnerabilities, service disruptions)
Document the intake sources and who monitors them. Auditors look for proof that inputs are not ad hoc.
Step 3: Define “threat” as a scenario, not a buzzword
Avoid one-word entries like “ransomware” with no context. Write threats as threat scenarios:
- Actor + technique + target + impact
- Example format: “External actor gains access via compromised third-party remote access tool and disrupts OT operations by manipulating control system configurations.”
This format makes it easier to map to assets and controls and to explain relevance.
Step 4: Build and maintain a threat register (minimum viable fields)
Use a spreadsheet, GRC tool, or ticketing system, but keep the fields consistent. Minimum recommended fields:
- Threat ID
- Threat scenario description (plain language)
- Affected environment (IT / OT / information asset)
- Impact type (availability, integrity, confidentiality, safety/reliability)
- Likely entry points (email, remote access, third party, removable media, supply chain update)
- Related assets or asset groups
- Existing controls/mitigations (high level)
- Owner (person/team)
- Status (new, under review, accepted, mitigated, monitoring)
- Last reviewed date + change log notes
Why auditors like this: It proves “identified and documented” and supports traceability to control decisions. (Cybersecurity Capability Maturity Model v2.1)
Step 5: Triage and prioritize (make it actionable)
Define triage rules so the register drives outcomes:
- Relevance screen: Does this threat apply to assets/tech you actually run?
- Impact screen: Could it affect critical services, OT uptime, safety, regulated reporting, or sensitive data?
- Exposure screen: Do you have the entry points (remote access, exposed services, third-party connectivity)?
Your triage output should feed at least one downstream process:
- Risk assessment updates
- Control selection and hardening priorities
- Security monitoring use cases
- Tabletop exercises and incident response scenarios
- Third-party due diligence focus areas (for threats that exploit suppliers or access paths)
Step 6: Establish governance: review cadence + change triggers
C2M2 does not set a cadence, so define one that you can sustain and defend. Use two refresh mechanisms:
- Event-driven reviews: new systems, new OT connectivity, major vendor change, significant incident, major vulnerability affecting your stack.
- Governance reviews: recurring cross-functional review with Security, OT, IT, Risk/GRC, and key third-party owners.
Keep agendas and decisions. If you cannot prove review occurred, the register looks stale even if it is good.
Step 7: Connect third-party risk to threat identification (often overlooked)
Most material threats enter through dependencies: remote support tools, MSP access, software updates, shared identity providers, and hosted environments. Build a mapping:
- Threat scenario → third-party dependency → required assurance or control requirement Examples:
- If a threat scenario involves “compromised vendor remote access,” ensure your third-party requirements include MFA, session logging, least privilege, time-bound access, and breach notification obligations.
If you manage third parties in a platform like Daydream, link threat scenarios directly to due diligence requirements and contract controls so procurement and vendor owners execute the mitigations without translation.
Required evidence and artifacts to retain
Retain artifacts that prove both identification and documentation, plus that it is operational:
- Threat identification procedure (1–3 pages is enough)
- Threat register (current version + prior versions or change history)
- Threat intake source list (feeds, mailing lists, portals, internal systems monitored)
- Meeting minutes or decision logs from threat review sessions
- Mapping document: threat scenarios → affected assets/asset groups
- Mapping document: threat scenarios → controls/risk treatment decisions (can be a simple crosswalk)
- Evidence of trigger-based updates (tickets/changes showing “new remote access implemented → threat register updated”)
- Third-party mapping where applicable (threat scenarios tied to critical suppliers and their access paths)
Evidence rule of thumb: If you cannot show who reviewed it, when, and what changed, expect exam friction.
Common exam/audit questions and hangups
Expect questions like:
- “Show me your documented cybersecurity threats, and explain why these are relevant to your environment.” (Cybersecurity Capability Maturity Model v2.1)
- “How do OT threats get identified, and who in OT validates them?”
- “What sources do you monitor for new threats that impact your technology stack?”
- “How do you ensure the threat list stays current after major changes or incidents?”
- “Show where threat identification feeds risk assessment, control selection, or monitoring.”
Hangups that slow audits:
- Threat register exists but has no timestamps, ownership, or review trail.
- The program is IT-only; OT is omitted or generic.
- Threats are listed, but there is no connection to assets or business impact.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating threat identification as an annual exercise.
Fix: Add change triggers tied to change management and incident learning, and keep a lightweight recurring review. -
Mistake: Confusing vulnerabilities with threats.
Fix: Keep both, but separate. Vulnerabilities are weaknesses; threats are scenarios/actors/paths that exploit weaknesses. -
Mistake: Copy-pasting a generic threat list.
Fix: Require an “applicability rationale” field tied to your asset inventory and architecture. -
Mistake: No third-party angle.
Fix: Add a field for “dependency/third party entry point” and route high-impact items to your third-party due diligence workflow. -
Mistake: No evidence of governance.
Fix: Store agendas, minutes, and approvals alongside the register. Auditors accept simple artifacts if they show discipline.
Enforcement context and risk implications
No public enforcement cases were provided in the supplied sources for this requirement, so this page does not cite enforcement outcomes.
From a risk standpoint, weak threat identification drives predictable failures:
- Controls drift away from real-world attacker paths.
- OT risk gets underweighted until an outage or safety issue forces attention.
- Third-party risk becomes a questionnaire exercise instead of addressing the access routes that matter.
Practical 30/60/90-day execution plan
First 30 days (stand up the minimum viable capability)
- Assign process owner(s) and define scope to include IT, OT, and information assets. (Cybersecurity Capability Maturity Model v2.1)
- Draft a short threat identification procedure: sources, triage, roles, outputs.
- Create the initial threat register with consistent fields and ownership.
- Identify threat intake sources (internal + external) and assign monitors.
- Hold the first cross-functional review session; capture minutes and decisions.
Next 60 days (make it operational and connected)
- Map top threat scenarios to critical asset groups and key business/operational impacts.
- Add change triggers: tie updates to change management and incident postmortems.
- Create a crosswalk from top threats to control owners and planned mitigations.
- Add third-party mapping for scenarios involving remote access, hosted services, or software supply chain.
By 90 days (make it audit-ready and sustainable)
- Run a second review cycle and show deltas: added/retired threats, revised scenarios, updated ownership.
- Validate OT coverage with OT leadership and document sign-off or meeting outcomes.
- Test downstream integration: pick several threats and trace them to risk decisions, monitoring changes, tabletop scenarios, or third-party contract requirements.
- Centralize evidence storage (register versions, minutes, mappings) so you can respond quickly to exam requests.
Frequently Asked Questions
Do we need a specific threat modeling methodology to meet the threat identification requirement?
C2M2 requires that threats are identified and documented, not that you adopt a specific methodology. Use a consistent scenario format and governance trail that you can repeat and defend. (Cybersecurity Capability Maturity Model v2.1)
How detailed does the threat register need to be for OT?
Detailed enough that an OT engineer recognizes the scenario as plausible for your environment and can name the likely entry points and impacted systems. If the OT entries look like generic IT ransomware statements, expect pushback.
Can vulnerability scans substitute for threat identification?
No. Vulnerability results can feed threat identification, but the requirement is about documenting threats relevant to your operations, including pathways and impacts. (Cybersecurity Capability Maturity Model v2.1)
How do we handle threats that are “possible” but not “probable”?
Document them if they are relevant and have high potential impact, then record your triage decision (monitor, accept, mitigate). Auditors generally accept risk-based prioritization if the rationale is documented.
What evidence is most persuasive in an assessment?
A current threat register with owners and review dates, plus meeting notes showing cross-functional review and updates over time. Tie a few high-priority threats to tangible actions like control changes or third-party requirements.
Where does third-party risk fit into threat identification?
Many threat scenarios depend on supplier access paths or service dependencies. Capture those dependencies in the threat register and route them into third-party due diligence and contract control requirements so the mitigation happens in procurement and operations, not just security.
Frequently Asked Questions
Do we need a specific threat modeling methodology to meet the threat identification requirement?
C2M2 requires that threats are identified and documented, not that you adopt a specific methodology. Use a consistent scenario format and governance trail that you can repeat and defend. (Cybersecurity Capability Maturity Model v2.1)
How detailed does the threat register need to be for OT?
Detailed enough that an OT engineer recognizes the scenario as plausible for your environment and can name the likely entry points and impacted systems. If the OT entries look like generic IT ransomware statements, expect pushback.
Can vulnerability scans substitute for threat identification?
No. Vulnerability results can feed threat identification, but the requirement is about documenting threats relevant to your operations, including pathways and impacts. (Cybersecurity Capability Maturity Model v2.1)
How do we handle threats that are “possible” but not “probable”?
Document them if they are relevant and have high potential impact, then record your triage decision (monitor, accept, mitigate). Auditors generally accept risk-based prioritization if the rationale is documented.
What evidence is most persuasive in an assessment?
A current threat register with owners and review dates, plus meeting notes showing cross-functional review and updates over time. Tie a few high-priority threats to tangible actions like control changes or third-party requirements.
Where does third-party risk fit into threat identification?
Many threat scenarios depend on supplier access paths or service dependencies. Capture those dependencies in the threat register and route them into third-party due diligence and contract control requirements so the mitigation happens in procurement and operations, not just security.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream