NIST Cybersecurity Framework 2.0 - Overview and Reference Guide

Cybersecurity Framework - CSF 2.0 Functions

The NIST Cybersecurity Framework (CSF) 2.0 provides an updated guidance for organizations on how to understand, assess, prioritize, communicate and manage cybersecurity risks alongside other risks of the enterprise, including financial, privacy, supply chain, reputational, technological, or physical risks.

The core of the Cybersecurity Framework contains a set of six Functions (Govern, Identify, Protect, Detect, Respond, and Recover), Categories (Guidance), Subcategories (Recommendations), Implementation Examples (Procedures) and Applicable Risks that provides a comprehensive guideline for managing cybersecurity risk.

The Functions, Categories, and Subcategories apply to all ICT used by an organization, including Information Technology (IT), the Internet of Things (IoT), and Operational Technology (OT). They also apply to all types of technology environments, including cloud, mobile, and artificial intelligence systems.

nist-csf-2.0-Govern

GOVERN

The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored.

• Understand and assess specific cybersecurity needs.
• Develop a tailored cybersecurity risk strategy.
• Establish defined risk management policies.
• Develop and communicate organizational cybersecurity practices.
• Establish and monitor cybersecurity supply chain risk management.
• Implement continuous oversight and checkpoints.

nist-csf-2.0-Identify

IDENTIFY

The organization’s current cybersecurity risks are understood.

  • Identify critical business processes and assets.
  • Maintain inventories of hardware, software, services, and systems.
  • Document information flows.
  • Identify threats, vulnerabilities, and risk to assets.
  • Lessons learned are used to identify improvements.
nist-csf-2.0-Protect

PROTECT

Safeguards to manage the organization’s cybersecurity risks are implemented.

  • Manage and track physical access to facilities and devices
  • Protect and monitor your devices.
  • Protect sensitive data.
  • Manage and maintain software.
  • Conduct regular backups.
  • Train users.
nist-csf-2.0-Detect

DETECT

Potential cybersecurity attacks and compromises are discovered and analyzed.

  • Identify critical business processes and assets.
  • Maintain inventories of hardware, software, services, and systems.
  • Document information flows.
  • Identify threats, vulnerabilities, and risk to assets.
  • Lessons learned are used to identify improvements.
nist-csf-2.0-Respond

RESPOND

Actions regarding a detected cybersecurity incident are taken.

  • Execute an incident response plan once an incident is declared, in coordination with relevant third parties.
  • Categorize and prioritize incidents and escalate or elevate as required.
  • Collect incident data and preserve its integrity and provenance.
  • Contain and eradicate incidents.
  • Notify internal and external stakeholders of any incidents and share incident information with them in line with your organization policies.
nist-csf-2.0-Recover

RECOVER

Assets and operations affected by a cybersecurity incident are restored.

  • Understand your organization’s roles and responsibilities.
  • Execute your recovery plan.
  • Communicate with internal and external stakeholders.
  • Verify your work.