
In recent years, critical national infrastructure operators (CNI) have witnessed a growth in OT-targeted cyber-attacks seeking to disrupt or destroy day-to-day operations.
At the same time, regulation of CNI sectors has been growing and companies have been challenged to meet increasingly more detailed security and compliance requirements.
In Australia, this has been driven by the original Security of Critical Infrastructure Act 2018 (SOCI Act) and ongoing amendments and updates in the last eight years.
With growing convergence between previously separate IT and OT environments, it has become critical for operators to measure and manage the continuous improvement of security maturity in their organisation.
Security practitioners are used to routinely testing and evaluating controls in place - be that via vulnerability scanning of internal and internet facing systems, targeted penetration tests or a broader maturity assessment against a well estbalished or formally mandated security framework with functions, categories and control measures tightly defined.
For operational technology environments, maturity models could include the Australian Energy Sector Cyber Security Framework (AESCSF), the US Cybersecurity Capability Maturity Model (C2M2), SANS Five ICS Cybersecurity Critical Controls, or a higher level framework such as the NIST CSF whioch provides a broader oversight of organisatioanl governnace and risk mangement practices.
The C2M2 was developed by the U.S. Department of Energy (DOE), private- and public-sector experts, and representatives of asset owners and operators within the energy sector and first released in 2012.
It has been widely used across the world to support self-assessments in various sectors and version 2.1 was launched in June 2022. There are resoutrces provided to build your knowledge of the approach.
Best for: OT-heavy critical infrastructure operations such as energy, utilities and industrial organisations
Strength: Most practical for OT environments
Weakness: Less recognised by boards/regulators outside critical sectors

For sectors with no regulation, the five ICS Critical Controls need to be a programmatic focus across prioritised operational assets. For organisations subject to larger regulation, they represent areas where efforts should be pursued to go beyond the baseline minimum requirements.
Best for: Quick wins and prioritisation of key technical controls
Strength: Practical and actionable
Weakness: Not a full maturity model like NIST CSF
Best for: Energy sector organisations, especially regulated environments in Australia (and soon New Zealand)
Strength: Sector-specific and regulator-aligned downunder
Weakness: Complex to learn and takes time to complete a full assessment
The NIST Cybersecurity Framework (CSF) is a voluntary, flexible, and widely adopted set of guidelines and best practices designed to help organisations of all sizes and sectors understand, manage, and reduce cybersecurity risks.
In 2024, version 2 was updated to include six core functions: Govern, Identify, Protect, Detect, Respond, and Recover.
Best for: Executive alignment, cross-sector benchmarking across many industries
Strength: Common language for leadership and regulators
Weakness: Not OT-specific; needs tailoring for your complex encvironment
Whilst similar in nature, each framework should be evaluated for application and purpose. A quick view of the four highlighted shows different ways to get value into your security programme:
Decide upfront:
You need cross-functional input from the whole business:
For each control or practice ensure you review or document:
You should end with a full understanding of your current maturity (or non/compliance). Reporting can include:
This is the next key stage in moving the maturity needle and mitigating key risks and we'll dive into the programme approach in a follow up blog.
For a quick lift to your OT security practices:
The Overcyte platform supports ongoing maturity assessments, maps to multiple frameworks (AESCSF, NIST CSF, Essential Eight), and provides dashboards that track progress over time. We can move your programme beyond a single, point in time assessment to a continuous improvement approach where efforts to resolve or remediate risks can flow instantly into your overall maturity score.