Professional Documents
Culture Documents
Field Name
Reference Version
Web Address
Summary
Comprehensive
Reference Document
Comments
Point of Contact
Dependency/ Requirement
Citations
e Reference Submission Form
Value
NIST-CSF-V1.1-to-DOE-C2M2-V2.1-OLIR-Mapping
1.1.0
https://www.nccoe.nist.gov/sites/default/files/2023-03/DOE-
C2M2V2_1-CSF-mapping.xlsx
No
06/29/2022
https://energy.gov/c2m2
The National Institute of Standards and Technology
Not applicable
C2M2@hq.doe.gov
Stand-alone
Not applicable
Focal Document Element Focal Document Element Description
ID Develop an organizational understanding to manage cybersecurity
risk to systems, people, assets, data, and capabilities.
ID.AM The data, personnel, devices, systems, and facilities that enable the
organization to achieve business purposes are identified and
managed consistent with their relative importance to organizational
objectives and the organization’s risk strategy.
ID.AM-1 Physical devices and systems within the organization are inventoried
ID.AM-1 Physical devices and systems within the organization are inventoried
ID.AM-1 Physical devices and systems within the organization are inventoried
ID.AM-1 Physical devices and systems within the organization are inventoried
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and
third-party stakeholders (e.g., suppliers, customers, partners) are
established
ID.BE The organization’s mission, objectives, stakeholders, and activities
are understood and prioritized; this information is used to inform
cybersecurity roles, responsibilities, and risk management decisions.
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-3 Threats, both internal and external, are identified and documented
ID.SC-5 Response and recovery planning and testing are conducted with
suppliers and third-party providers
ID.SC-5 Response and recovery planning and testing are conducted with
suppliers and third-party providers
ID.SC-5 Response and recovery planning and testing are conducted with
suppliers and third-party providers
ID.SC-5 Response and recovery planning and testing are conducted with
suppliers and third-party providers
ID.SC-5 Response and recovery planning and testing are conducted with
suppliers and third-party providers
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and
audited for authorized devices, users and processes
PR.AC-2 Physical access to assets is managed and protected
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk of the transaction
(e.g., individuals’ security and privacy risks and other organizational
risks)
PR.DS-7 The development and testing environment(s) are separate from the
production environment
PR.DS-7 The development and testing environment(s) are separate from the
production environment
PR.DS-8 Integrity checking mechanisms are used to verify hardware integrity
DE.AE-1 A baseline of network operations and expected data flows for users
and systems is established and managed
DE.AE-3 Event data are collected and correlated from multiple sources and
DE.AE-3 sensors
Event data are collected and correlated from multiple sources and
sensors
DE.AE-3 Event data are collected and correlated from multiple sources and
sensors
DE.AE-3 Event data are collected and correlated from multiple sources and
sensors
DE.AE-3 Event data are collected and correlated from multiple sources and
sensors
DE.AE-3 Event data are collected and correlated from multiple sources and
sensors
DE.AE-3 Event data are collected and correlated from multiple sources and
sensors
DE.AE-4 Impact of events is determined
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
DE.DP-1 Roles and responsibilities for detection are well defined to ensure
accountability
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-1 Personnel know their roles and order of operations when a response
is needed
RS.CO-2 Incidents are reported consistent with established criteria
Cyber risk identification considers risks that may arise from or impact
critical infrastructure or other interdependent organizations N
Continuity plans address IT, OT, and information assets that are
important to the delivery of the function, including the availability of
backup data and replacement, redundant, and spare IT and OT N
assets
Defined methods are used to analyze higher priority cyber risks (for
example, analyzing the prevalence of types of attacks to estimate
likelihood, using the results of controls assessments to estimate N
susceptibility)
Defined methods are used to analyze higher priority cyber risks (for
example, analyzing the prevalence of types of attacks to estimate
likelihood, using the results of controls assessments to estimate Y
susceptibility)
Defined methods are used to analyze higher priority cyber risks (for
example, analyzing the prevalence of types of attacks to estimate
likelihood, using the results of controls assessments to estimate Y
susceptibility)
Defined criteria are used to prioritize cyber risks (for example, impact
to the organization, impact to the community, likelihood, Y
susceptibility, risk tolerance)
Third parties that have access to, control of, or custody of any IT, OT,
or information assets that are important to the delivery of the Y
function are identified, at least in an ad hoc manner
Third parties are prioritized according to established criteria (for
example, importance to the delivery of the function, impact of a
compromise or disruption, ability to negotiate cybersecurity Y
requirements within contracts)
Assets that are important to the delivery of the function are logically
or physically segmented into distinct security zones based on asset Y
cybersecurity requirements
Network protections incorporate the principles of least privilege and
least functionality Y
Network protections include monitoring, analysis, and control of
network traffic for selected security zones (for example, firewalls, Y
allowlisting, intrusion detection and prevention systems (IDPS))
All assets are segmented into distinct security zones based on
cybersecurity requirements Y
Separate networks are implemented, where warranted, that logically
or physically segment assets into security zones with independent Y
authentication
OT systems are operationally independent from IT systems so that
OT operations can be sustained during an outage of IT systems Y
Device connections to the network are controlled to ensure that only
authorized devices can connect (for example, network access control Y
(NAC))
Identities are provisioned, at least in an ad hoc manner, for
personnel and other entities such as services and devices that
require access to assets (note that this does not preclude shared Y
identities)
Continuity plans address IT, OT, and information assets that are
important to the delivery of the function, including the availability of
backup data and replacement, redundant, and spare IT and OT N
assets
Assets that are important to the delivery of the function are logically
or physically segmented into distinct security zones based on asset Y
cybersecurity requirements
Network protections incorporate the principles of least privilege and
least functionality Y
Network protections include monitoring, analysis, and control of
network traffic for selected security zones (for example, firewalls, Y
allowlisting, intrusion detection and prevention systems (IDPS))
Web traffic and email are monitored, analyzed, and controlled (for
example, malicious link blocking, suspicious download blocking, Y
email authentication techniques, IP address blocking)
All assets are segmented into distinct security zones based on
cybersecurity requirements Y
Separate networks are implemented, where warranted, that logically
or physically segment assets into security zones with independent Y
authentication
OT systems are operationally independent from IT systems so that
OT operations can be sustained during an outage of IT systems Y
Device connections to the network are controlled to ensure that only
authorized devices can connect (for example, network access control Y
(NAC))
The cybersecurity architecture enables the isolation of compromised
assets Y
Predefined states of operation are documented and can be
implemented based on the cybersecurity state of the function or N
when triggered by activities in other domains
Cybersecurity incident responses leverage and trigger predefined
states of operation (SITUATION-3g) N
Continuity plans address IT, OT, and information assets that are
important to the delivery of the function, including the availability of
backup data and replacement, redundant, and spare IT and OT N
assets
ID.AM-1:G1 6
ID.AM-1:G1 7
ID.AM-1:G1 7
ID.AM-2:G1 6
ID.AM-2:G1 7
ID.AM-2:G1 7
ID.AM-2:G1 7
ID.AM-4:G1 6
ID.AM-4:G1 7
ID.AM-4:G1 7
ID.AM-4:G1 7
6
3
ID.AM-6:G1 5
ID.AM-6:G1 8
ID.AM-6:G1 5
ID.AM-6:G1 6
ID.AM-6:G1 6
5
5
6
4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 3
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
ID.GV-1:G1 6
ID.GV-1:G1 4
7
5
3
4
ID.GV-3:G1 6
ID.GV-3:G1 6
ID.GV-3:G1 6
8
6
ID.RA-2:G1 8
ID.RA-2:G1 7
ID.RA-2:G1 9
ID.RA-2:G1 7
ID.RA-3:G1 6
ID.RA-3:G1 6
ID.RA-3:G1 5
4
6
ID.RA-5:G1 4
ID.RA-5:G1 4
ID.RA-5:G1 8
ID.RA-5:G1 6
ID.RA-5:G1 8
ID.RA-5:G1 8
7
ID.RM-1:G1 6
ID.RM-1:G1 6
ID.RM-1:G1 5
ID.RM-1:G1 5
ID.RM-1:G1 4
ID.RM-1:G1 4
ID.RM-1:G1 4
ID.RM-1:G1 4
ID.RM-1:G1 4
ID.RM-1:G1 6
ID.RM-1:G1 6
ID.RM-1:G1 6
ID.RM-3:G1 6
ID.RM-3:G1 4
4
ID.RM-3:G1 4
ID.RM-3:G1 6
ID.SC-2:G1 7
ID.SC-2:G1 7
ID.SC-2:G1 7
ID.SC-2:G1 5
ID.SC-2:G1 5
10
PR.AC-1:G1 9
PR.AC-1:G1 9
PR.AC-1:G1 9
PR.AC-1:G1 9
PR.AC-1:G1 7
PR.AC-1:G1 7
PR.AC-1:G1 7
PR.AC-1:G1 5
PR.AC-1:G1 4
PR.AC-1:G1 4
PR.AC-2:G1 9
PR.AC-2:G1 6
PR.AC-2:G1 7
PR.AC-2:G1 5
PR.AC-2:G1 5
PR.AC-2:G1 5
PR.AC-2:G1 5
PR.AC-2:G1 6
PR.AC-2:G1 6
PR.AC-2:G1 5
PR.AC-2:G1 5
PR.AC-2:G1 6
PR.AC-3:G1 6
PR.AC-3:G1 7
3
PR.AC-3:G1 7
PR.AC-3:G1 6
PR.AC-4:G1 6
PR.AC-4:G1 8
PR.AC-4:G1 4
PR.AC-4:G1 6
PR.AC-4:G1 9
PR.AC-4:G1 6
PR.AC-4:G1 3
PR.AC-4:G1 6
7
2
PR.AC-5:G1 6
PR.AC-5:G1 4
PR.AC-5:G1 6
PR.AC-5:G1 6
PR.AC-5:G1 7
PR.AC-5:G1 5
PR.AC-5:G1 4
PR.AC-5:G1 4
PR.AC-5:G1 7
PR.AC-6:G1 7
PR.AC-6:G1 6
PR.AC-6:G1 6
PR.AC-6:G1 4
10
8
PR.AC-7:G1 8
PR.AC-7:G1 8
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 6
PR.AT-1:G1 8
9
PR.AT-1:G1 7
PR.AT-1:G1 4
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-1:G1 5
PR.AT-2:G1 7
PR.AT-2:G1 7
PR.AT-2:G1 7
PR.AT-2:G1 7
PR.AT-2:G1 7
PR.AT-2:G1 6
PR.AT-2:G1 5
PR.AT-2:G1 5
PR.AT-2:G1 6
PR.AT-2:G1 5
PR.AT-2:G1 7
PR.AT-2:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 6
PR.AT-3:G1 5
PR.AT-3:G1 6
PR.AT-3:G1 5
PR.AT-3:G1 7
PR.AT-3:G1 7
PR.AT-3:G1 3
PR.AT-3:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 6
PR.AT-4:G1 5
PR.AT-4:G1 6
PR.AT-4:G1 5
PR.AT-4:G1 7
PR.AT-4:G1 7
PR.AT-4:G1 6
PR.AT-4:G1 3
PR.AT-4:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 6
PR.AT-5:G1 5
PR.AT-5:G1 6
PR.AT-5:G1 3
PR.AT-5:G1 7
PR.AT-5:G1 7
PR.AT-5:G1 4
PR.AT-5:G1 7
PR.DS-1:G1 4
7
PR.DS-1:G1 8
PR.DS-1:G1 8
PR.DS-1:G1 6
PR.DS-1:G1 7
PR.DS-1:G1 7
PR.DS-1:G1 6
PR.DS-1:G1 7
8
6
4
3
PR.DS-5:G1 4
PR.DS-5:G1 6
6
6
6
6
6
7
PR.DS-5:G1 10
PR.DS-6:G1 3
PR.DS-6:G1 7
PR.DS-6:G1 6
PR.DS-7:G1 5
PR.DS-7:G1 5
PR.DS-7:G1 5
PR.DS-7:G1 5
PR.IP-1:G1 8
7
PR.IP-1:G1 6
PR.IP-1:G1 7
PR.IP-1:G1 6
PR.IP-1:G1 6
PR.IP-1:G1 7
PR.IP-3:G1 4
PR.IP-3:G1 4
PR.IP-3:G1 4
PR.IP-3:G1 4
PR.IP-3:G1 6
PR.IP-3:G1 6
PR.IP-3:G1 6
4
PR.IP-3:G1 5
4
2
PR.IP-3:G1 5
PR.IP-3:G1 6
10
PR.IP-6:G1 8
PR.IP-6:G1 8
4
4
PR.IP-9:G1 5
PR.IP-9:G1 3
PR.IP-9:G1 5
PR.IP-9:G1 8
PR.IP-9:G1 8
PR.IP-9:G1 8
PR.IP-9:G1 7
PR.IP-9:G1 5
PR.IP-9:G1 8
PR.IP-9:G1 8
PR.IP-9:G1 8
PR.IP-9:G1 7
PR.IP-9:G1 8
PR.IP-10:G1 3
PR.IP-10:G1 8
PR.IP-10:G1 8
PR.IP-10:G1 7
6
6
PR.IP-11:G1 5
PR.IP-11:G1 6
PR.IP-11:G1 5
PR.IP-11:G1 5
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 6
PR.IP-11:G1 7
PR.IP-12:G1 5
PR.IP-12:G1 6
6
4
PR.PT-1:G1 9
PR.PT-1:G1 9
PR.PT-1:G1 9
PR.PT-1:G1 8
PR.PT-1:G1 6
PR.PT-1:G1 7
PR.PT-1:G1 4
PR.PT-2:G1 7
PR.PT-2:G1 6
PR.PT-2:G1 5
PR.PT-3:G1 8
PR.PT-3:G1 4
PR.PT-3:G1 8
PR.PT-3:G1 6
5
PR.PT-4:G1 2
PR.PT-4:G1 6
PR.PT-4:G1 5
PR.PT-4:G1 6
PR.PT-4:G1 4
PR.PT-4:G1 7
PR.PT-4:G1 7
PR.PT-4:G1 5
PR.PT-4:G1 7
PR.PT-4:G1 7
PR.PT-4:G1 7
PR.PT-4:G1 7
5
5
10
6
5
DE.AE-4:G1 6
DE.AE-4:G1 9
DE.AE-5:G1 6
DE.AE-5:G1 6
DE.AE-5:G1 6
DE.AE-5:G1 6
DE.CM-1:G1 8
DE.CM-1:G1 8
7
7
DE.CM-1:G1 8
5
7
DE.CM-4:G1 5
DE.CM-4:G1 6
DE.CM-4:G1 5
DE.CM-5:G1 5
DE.CM-5:G1 5
DE.CM-7:G1 7
DE.CM-7:G1 7
DE.CM-7:G1 7
DE.CM-7:G1 5
DE.CM-7:G1 5
DE.CM-7:G1 5
DE.CM-7:G1 7
DE.CM-7:G1 7
DE.CM-7:G1 6
DE.CM-8:G1 7
DE.CM-8:G1 7
DE.DP-1:G1 8
DE.DP-1:G1 8
DE.DP-1:G1 4
DE.DP-1:G1 4
DE.DP-2:G1 8
5
DE.DP-2:G1 8
DE.DP-2:G1 8
DE.DP-2:G1 8
DE.DP-3:G1 7
DE.DP-3:G1 7
DE.DP-3:G1 6
DE.DP-3:G1 7
DE.DP-3:G1 6
DE.DP-4:G1 7
DE.DP-4:G1 7
DE.DP-4:G1 7
6
5
10
RS.CO-1:G1 6
RS.CO-1:G1 7
RS.CO-1:G1 7
RS.CO-1:G1 6
RS.CO-1:G1 7
4
5
RS.CO-2:G1 7
RS.CO-2:G1 7
RS.CO-2:G1 7
RS.CO-2:G1 7
RS.CO-3:G1 7
RS.CO-3:G1 7
RS.CO-3:G1 7
RS.CO-3:G1 7
RS.CO-3:G1 7
RS.CO-4:G1 5
RS.CO-4:G1 5
RS.CO-4:G1 6
RS.CO-4:G1 7
RS.CO-4:G1 7
RS.CO-5:G1 3
RS.CO-5:G1 7
RS.CO-5:G1 7
RS.CO-5:G1 5
RS.CO-5:G1 7
RS.CO-5:G1 7
3
6
RS.AN-2:G1 7
RS.AN-2:G1 4
RS.AN-2:G1 7
RS.AN-5:G1 7
4
RS.AN-5:G1 6
RS.AN-5:G1 7
RS.AN-5:G1 6
RS.AN-5:G1 7
RS.AN-5:G1 7
RS.AN-5:G1 7
RS.AN-5:G1 7
RS.MI-1:G1 8
RS.MI-1:G1 5
RS.MI-1:G1 6
8
5
RS.MI-3:G1 7
RS.MI-3:G1 7
RS.IM-1:G1 5
RS.IM-1:G1 8
RS.IM-1:G1 8
RS.IM-1:G1 7
RS.IM-1:G1 8
RS.IM-1:G1 2
RS.IM-2:G1 8
RS.IM-2:G1 8
RS.IM-2:G1 7
RS.IM-2:G1 8
RS.IM-2:G1 5
RC.RP-1:G1 7
RC.RP-1:G1 7
RC.RP-1:G1 7
RC.IM-1:G1 3
RC.IM-1:G1 7
RC.IM-1:G1 7
RC.IM-1:G1 7
RC.IM-1:G1 5
RC.IM-1:G1 2
RC.IM-2:G1 7
RC.IM-2:G1 7
RC.IM-2:G1 7
RC.IM-2:G1 7
RC.IM-2:G1 3
6
RC.CO-3:G1 6
RC.CO-3:G1 6
RC.CO-3:G1 8
RC.CO-3:G1 6