🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now β†’
Menu

Categories

NIST Cybersecurity Framework (CSF 2.0): Complete Implementation Guide (2026)

NIST Cybersecurity Framework (CSF 2.0): Complete Implementation Guide (2026)

The NIST Cybersecurity Framework (CSF) is the most widely adopted cybersecurity risk management framework in the United States, and increasingly worldwide. Developed by the National Institute of Standards and Technology, it provides a flexible, risk-based approach to managing cybersecurity that can be adapted to any organization size or industry.

NIST Cybersecurity Framework

πŸ“₯ Free Cloud Security Framework Cheat Sheet

Includes NIST CSF core functions, implementation tiers, profiles, and cross-reference to other frameworks.

Download Free PDF β†’

Table of Contents

NIST CSF Overview

Originally released in 2014 for critical infrastructure, NIST CSF has become the de facto cybersecurity framework for organizations of all sizes. It is voluntary (except for US federal agencies), risk-based, and designed to complement β€” not replace β€” existing security programs.

NIST CSF consists of three main components:

  1. Framework Core β€” 6 Functions, 22 Categories, and 106 Subcategories that describe cybersecurity activities
  2. Implementation Tiers β€” 4 tiers describing the degree of rigor and sophistication
  3. Profiles β€” Customized alignment of the Framework Core to business requirements

CSF 1.1 vs CSF 2.0

NIST CSF 2.0, released in February 2024, introduced significant changes:

ChangeCSF 1.1CSF 2.0
Core Functions5 (Identify through Recover)6 (added Govern)
ScopeCritical infrastructure focusedAll organizations
Supply ChainLimited guidanceExpanded supply chain risk management
GovernancePart of Identify functionStandalone Govern function
Community ProfilesNot availableShared community profiles

The 6 Core Functions

GOVERN (GV) β€” New in CSF 2.0

Establishes cybersecurity governance and risk management strategy. This function ensures cybersecurity is integrated into enterprise-wide risk management and is supported by leadership.

  • GV.OC β€” Organizational Context: mission, stakeholders, legal requirements
  • GV.RM β€” Risk Management Strategy: risk appetite, risk tolerance
  • GV.RR β€” Roles, Responsibilities & Authorities
  • GV.PO β€” Policy: establish and communicate cybersecurity policy
  • GV.OV β€” Oversight: review and adjust strategy
  • GV.SC β€” Cybersecurity Supply Chain Risk Management

IDENTIFY (ID)

Develop understanding of your organization to manage cybersecurity risk.

  • ID.AM β€” Asset Management: hardware, software, data, systems inventory
  • ID.RA β€” Risk Assessment: identify vulnerabilities, threats, likelihood, impact
  • ID.IM β€” Improvement: lessons learned, continuous improvement

PROTECT (PR)

Implement safeguards to ensure delivery of critical services.

  • PR.AA β€” Identity Management, Authentication, Access Control
  • PR.AT β€” Awareness and Training
  • PR.DS β€” Data Security
  • PR.PS β€” Platform Security (hardening, configuration management)
  • PR.IR β€” Technology Infrastructure Resilience

DETECT (DE)

Develop and implement activities to identify cybersecurity events.

  • DE.CM β€” Continuous Monitoring: network, physical, personnel activity
  • DE.AE β€” Adverse Event Analysis

RESPOND (RS)

Take action regarding detected cybersecurity incidents.

  • RS.MA β€” Incident Management: triage, escalation, containment
  • RS.AN β€” Incident Analysis: forensics, root cause
  • RS.CO β€” Incident Response Reporting and Communication
  • RS.MI β€” Incident Mitigation

RECOVER (RC)

Maintain plans for resilience and restore capabilities after an incident.

  • RC.RP β€” Incident Recovery Plan Execution
  • RC.CO β€” Incident Recovery Communication

Implementation Tiers

TierNameRisk ManagementIntegration
1PartialAd hoc, reactiveLimited awareness of risks
2Risk InformedApproved but not org-wideCyber risk awareness exists
3RepeatableFormal, regularly updatedOrg-wide policy and process
4AdaptiveContinuous improvementAdapts based on indicators

Profiles & Gap Analysis

Profiles are the most practical part of NIST CSF. They allow you to:

  1. Create a Current Profile β€” Document which subcategories you currently implement and at what level
  2. Define a Target Profile β€” Set desired state based on business requirements, risk tolerance, and industry regulations
  3. Perform Gap Analysis β€” Compare Current vs. Target to identify priorities
  4. Build an Action Plan β€” Prioritize improvements based on business risk and available resources
πŸ’‘ Pro Tip: NIST CSF 2.0 introduces Community Profiles β€” pre-built profiles for specific industries (healthcare, finance, manufacturing). Use these as starting points instead of building from scratch.

Key Categories & Subcategories

NIST CSF 2.0 contains 22 categories across the 6 functions. Here are the most critical subcategories for cloud environments:

IDSubcategoryCloud Implementation
ID.AM-1Physical devices inventoriedCloud asset discovery tools, CMDB
PR.AA-1Identities managedIAM policies, SSO, lifecycle management
PR.AA-3MFA implementedFIDO2 keys, authenticator apps
PR.DS-1Data-at-rest protectedAES-256 encryption, KMS
PR.DS-2Data-in-transit protectedTLS 1.3, mTLS, VPN
DE.CM-1Networks monitoredVPC Flow Logs, CloudTrail, SIEM

Implementation Steps

  1. Step 1: Prioritize and Scope β€” Define business objectives and scope of the NIST CSF implementation
  2. Step 2: Orient β€” Identify related systems, assets, regulatory requirements, and threat landscape
  3. Step 3: Create a Current Profile β€” Assess existing cybersecurity practices against Framework subcategories
  4. Step 4: Conduct Risk Assessment β€” Analyze threats, vulnerabilities, likelihood, and impact
  5. Step 5: Create a Target Profile β€” Define desired cybersecurity outcomes
  6. Step 6: Determine Gaps β€” Compare Current and Target profiles
  7. Step 7: Implement Action Plan β€” Prioritize and address gaps based on risk and resources

Mapping to Other Frameworks

NIST CSF FunctionISO 27001CIS ControlsSOC 2
GovernClauses 4-7CIS 15CC1.x
IdentifyA.5.9-13CIS 1, 2CC3.x
ProtectA.6-8CIS 3-6, 14CC5-6
DetectA.8.15-16CIS 8, 13CC7.x
RespondA.5.24-28CIS 17CC7.3-5
RecoverA.5.29-30CIS 11A1.2

Best Practices

  1. Start with governance β€” Get leadership buy-in before implementation
  2. Use Community Profiles β€” Leverage pre-built industry profiles as starting points
  3. Focus on high-priority gaps β€” You don't need to implement every subcategory at once
  4. Integrate with existing processes β€” NIST CSF should complement, not replace, what you already do
  5. Review annually β€” Update profiles as your threat landscape and business requirements change
  6. Map to technical controls β€” Use CIS Controls or NIST 800-53 for specific implementation guidance

πŸ“₯ Download the Cloud Security Cheat Sheet

NIST CSF core functions, implementation tiers, and framework cross-reference in a printable PDF.

Download Free PDF β†’

Related Articles

Share this article:
Dargslan Editorial Team (Dargslan)
About the Author

Dargslan Editorial Team (Dargslan)

Collective of Software Developers, System Administrators, DevOps Engineers, and IT Authors

Dargslan is an independent technology publishing collective formed by experienced software developers, system administrators, and IT specialists.

The Dargslan editorial team works collaboratively to create practical, hands-on technology books focused on real-world use cases. Each publication is developed, reviewed, and...

Programming Languages Linux Administration Web Development Cybersecurity Networking

Stay Updated

Subscribe to our newsletter for the latest tutorials, tips, and exclusive offers.