Over 50%
Organizations reporting use of the NIST Cybersecurity Framework globally
11 new controls in CSF 2.0
New controls added to Annex A in the 2022 revision cycle
Over 50 frameworks
Informative references mapped to CSF 2.0 subcategories
Up to 85%
Reduction in cyber incidents reported by organizations that implement CSF IG1 equivalent controls

NIST released Cybersecurity Framework 2.0 in February 2024, the first major revision since the original 1.0 in 2014. The headline change is the addition of a sixth core function, Govern, which addresses the organizational context, risk management strategy, and accountability structures that determine how the other five functions operate. CSF 2.0 also formally drops the original framing as a critical infrastructure framework, explicitly positioning it for organizations of all sizes, sectors, and maturity levels. The practical implication: CSF 2.0 is now the baseline governance document most security programs should align to, regardless of whether they are subject to sector-specific regulation.

The framework is structured around six core functions (Govern, Identify, Protect, Detect, Respond, Recover), each subdivided into categories and subcategories. The subcategories are the actionable control statements: 106 of them in CSF 2.0. NIST provides informative references that map each subcategory to specific controls in CIS Controls, NIST 800-53, ISO 27001, and COBIT, making CSF the Rosetta Stone of security frameworks. This guide covers how to build a CSF Profile for your organization, assess your current maturity Tier, prioritize subcategory implementation, and use the framework's built-in crosswalks to avoid duplicate compliance work.

What Changed from CSF 1.1 to CSF 2.0

The structural changes in CSF 2.0 have direct operational implications for security programs that built their governance around the original framework.

The new Govern function: CSF 2.0 adds GV (Govern) as the sixth core function, covering: organizational context (GV.OC), risk management strategy (GV.RM), roles and responsibilities (GV.RR), policy (GV.PO), oversight (GV.OV), and cybersecurity supply chain risk management (GV.SC). These subcategories address the governance infrastructure that enables the other five functions to operate consistently. In CSF 1.1, these concepts were embedded under Identify; elevating them to their own function signals that NIST considers governance a prerequisite rather than a component.

Supply chain risk management (SCRM): CSF 2.0 significantly expands SCRM coverage through GV.SC, adding 10 subcategories dedicated to third-party and supply chain cybersecurity. This reflects the post-SolarWinds, post-MOVEit reality that the software supply chain is now a primary attack surface requiring explicit program-level management.

Expanded scope: CSF 1.0 and 1.1 were explicitly written for critical infrastructure. CSF 2.0 removes this framing entirely, making the framework applicable to startups, SMBs, educational institutions, and government agencies equally. NIST published separate Quick Start Guides for small businesses, enterprise risk managers, and specific sectors to support this broader adoption.

Profile and Tier refinements: CSF 2.0 clarifies that Profiles describe an organization's current or target cybersecurity posture for a specific use case, not a universal organizational maturity score. Tiers (1 through 4) describe how cybersecurity risk management practices are integrated into broader organizational risk management, not a ranking of overall security capability. This distinction matters: an organization can be Tier 4 on governance and Tier 1 on technical detection coverage.

What did not change: The five original functions (Identify, Protect, Detect, Respond, Recover) remain structurally intact. If your existing program is aligned to CSF 1.1, your mapping work is largely preserved; the primary addition is the Govern layer on top.

The Six Core Functions and Their Subcategories

CSF 2.0 contains 106 subcategories across six functions. Understanding the function-level intent helps prioritize which categories to address first.

GV (Govern): Sets the organizational context for cybersecurity risk management. Key subcategories: GV.OC-01 (mission and stakeholder expectations), GV.RM-01 (risk tolerance articulated by leadership), GV.RR-01 (roles and responsibilities defined), GV.PO-01 (policy established and communicated), GV.SC-01 (supply chain risk management program). Govern is the function most organizations have the largest gap on because it requires executive engagement, not just technical implementation.

ID (Identify): Establishes understanding of organizational assets, business context, and risk. Key subcategories: ID.AM (asset management, knowing what you have), ID.RA (risk assessment process), ID.IM (improvement, incorporating lessons learned). The asset management foundation is the prerequisite everything else depends on: you cannot protect, detect, or respond to threats against assets you do not know exist.

PR (Protect): Implements safeguards. Covers identity management (PR.AA), awareness training (PR.AT), data security (PR.DS), platform security (PR.PS), and technology infrastructure resilience (PR.IR). This function maps most directly to the defensive controls in CIS Controls IG1 and IG2.

DE (Detect): Identifies cybersecurity events. Key subcategories: DE.CM (continuous monitoring), DE.AE (adverse event analysis). Detection coverage is the most frequently underinvested function in organizations that build strong preventive controls but have inadequate visibility into what is happening on their network and endpoints.

RS (Respond): Defines actions after a cybersecurity incident is detected. Covers incident management (RS.MA), incident analysis (RS.AN), incident response reporting and communication (RS.CO), mitigation (RS.MI), and improvements (RS.IM). The Respond function requires documented, tested plans rather than ad-hoc improvisation.

RC (Recover): Restores capabilities after an incident. RC.RP (recovery plan execution), RC.CO (communications during recovery). Organizations frequently underinvest here until after a ransomware incident makes the gap painful.

Prioritization guidance: Address Govern first to establish the risk tolerance and accountability framework that defines what target state you are building toward. Then prioritize Identify (asset management) as the prerequisite for everything downstream. Protect and Detect are parallel workstreams; Respond and Recover require documented plans before an incident tests them.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

CSF Tiers and Profiles: What They Actually Mean

The Tier and Profile concepts are frequently misunderstood, which leads organizations to either over-engineer their CSF implementation or misuse the framework as a maturity scoring tool.

Tiers (1-4) describe risk management integration, not capability level:

  • Tier 1 (Partial): Cybersecurity risk management is ad hoc and reactive. Practices are not formalized. Risk awareness exists at an individual level but is not organizational.
  • Tier 2 (Risk Informed): Risk management practices exist but are not organization-wide. Organizational risk tolerance is not formally articulated.
  • Tier 3 (Repeatable): Risk management practices are formally documented, consistently applied, and regularly reviewed. Risk tolerance is established and communicated.
  • Tier 4 (Adaptive): The organization actively adapts its cybersecurity practices based on lessons learned and continuous improvement. Risk management is integrated into business decisions at all levels.

Tiers do not measure technical security capability. An organization can have mature endpoint detection (technical) but operate at Tier 1 (governance) because there is no formal risk management process informing security investment decisions. The Tier is an input to the Profile, not an output of a controls assessment.

Profiles describe current vs. target state for a specific context: A CSF Profile is a selection of CSF outcomes (subcategories) that describes either the current state (Current Profile) or desired future state (Target Profile) of cybersecurity risk management for a specific organizational context. Profiles are not universal; a payment processing system might have a different Target Profile than an HR data store.

Building a useful Profile:

  1. Define the scope (which systems, business processes, or risk scenario this Profile addresses)
  2. Identify relevant subcategories by reviewing all 106 and selecting those applicable to the scope
  3. Document the current implementation level for each selected subcategory (not implemented, partially implemented, fully implemented)
  4. Define the Target Profile based on risk tolerance and business requirements
  5. Identify gaps between Current and Target Profiles
  6. Prioritize gap closure by business risk impact

NIST provides Profile templates and examples in the CSF 2.0 reference tool at csrc.nist.gov.

Mapping CSF 2.0 to CIS Controls and NIST 800-53

One of CSF 2.0's primary practical values is its role as a crosswalk between frameworks. Using the NIST Online Informative References (OLIR) tool, every CSF subcategory maps to specific controls in CIS Controls v8, NIST SP 800-53 Rev 5, ISO 27001:2022, COBIT 2019, and others. This mapping lets you avoid duplicate work when multiple compliance frameworks apply to your organization.

CSF to CIS Controls mapping: CIS Controls Implementation Group 1 (IG1) maps primarily to CSF Protect and Identify subcategories. If you have completed an IG1 implementation, you have addressed a significant portion of PR and ID subcategory requirements. Key mappings:

  • CIS Control 1 (Asset Inventory) maps to ID.AM subcategories
  • CIS Control 2 (Software Asset Management) maps to ID.AM-2 and PR.PS subcategories
  • CIS Control 5 (Account Management) maps to PR.AA subcategories
  • CIS Control 17 (Incident Response Management) maps to RS and RC subcategories

CSF to NIST 800-53 mapping: 800-53 is more granular than CSF; each CSF subcategory typically maps to multiple 800-53 controls. Organizations subject to FISMA, FedRAMP, or federal contract security requirements already working in 800-53 can use the OLIR crosswalk to identify which 800-53 controls satisfy CSF requirements without a separate CSF assessment effort.

Practical approach for multi-framework environments: Conduct your gap assessment using CSF subcategories as the evaluation unit. Map each gap to the specific CIS Control, 800-53 control, or ISO 27001 clause that closes it. This produces a single prioritized remediation list that satisfies multiple frameworks simultaneously, avoiding the operational overhead of running parallel compliance programs.

NIST's OLIR catalog is searchable at csrc.nist.gov/Projects/olir and includes community-submitted mappings from major framework owners.

Running a CSF 2.0 Gap Assessment

A CSF 2.0 gap assessment evaluates your current implementation against each applicable subcategory and produces a prioritized remediation backlog. The process has four phases.

Phase 1: Scope definition Determine what organizational scope the assessment covers. Options: the entire organization (enterprise-wide Profile), a specific business unit, a specific technology system, or a specific risk scenario (e.g., ransomware resilience). Narrower scope produces more actionable results; enterprise-wide assessments often produce generic findings.

Phase 2: Subcategory evaluation For each of the 106 CSF 2.0 subcategories, assess current implementation on a simple three-point scale: Not Implemented, Partially Implemented, or Fully Implemented. Evidence for each rating should be documented. Common evidence sources: policy documents, process documentation, tool configurations, training completion records, and test results (penetration tests, tabletop exercises).

Tools for CSF assessments:

  • CISA's Cyber Resilience Review (CRR): Free assessment tool aligned to CSF
  • NIST Baldrige Cybersecurity Excellence Builder: Self-assessment questionnaire
  • Commercial GRC platforms (ServiceNow GRC, RSA Archer, Archer, Tugboat Logic): Structured CSF assessment templates with evidence collection workflows

Phase 3: Gap analysis and prioritization Compare Current Profile to Target Profile. Prioritize gaps using two factors: risk impact (how much does this gap increase the probability or impact of a significant security incident?) and implementation feasibility (can this gap be closed quickly, or does it require significant investment?). High-risk gaps that are quick to close get priority; high-risk gaps requiring significant investment get resource planning.

Phase 4: Remediation roadmap Translate prioritized gaps into a program roadmap with quarterly milestones. Assign owners for each workstream. Use the CSF subcategory IDs as work item labels in your project tracking system so progress is traceable back to the framework. Report progress to leadership using the Profile format: percentage of target subcategories at Fully Implemented status.

Common Implementation Pitfalls

Organizations adopting CSF 2.0 repeat several mistakes that reduce the framework's operational value.

Treating CSF as a compliance checklist rather than a risk management tool: CSF subcategories are outcomes, not prescriptive controls. An organization that checks every box without understanding the risk rationale behind each subcategory has a checklist, not a security program. The Govern function exists precisely to force this risk context; if GV.RM subcategories (risk tolerance, risk strategy) are not addressed first, the rest of the framework lacks direction.

Conflating Tier with maturity: Presenting a Tier 3 rating to the board as meaning the organization has strong security is misleading. Tiers describe governance integration, not control effectiveness. A Tier 3 organization may have excellent risk management processes applied to a mediocre set of technical controls.

Scope too broad for the first Profile: Enterprise-wide CSF assessments produce low-resolution findings because every system and process has different risk profiles. A more useful approach is to conduct a high-resolution Profile for the two or three highest-risk business functions first, then expand coverage.

Skipping the Govern function: Many security teams start with Protect and Detect because those map to tool configurations they understand. Govern subcategories require executive engagement and policy documentation that security teams cannot produce unilaterally. Without GV.RM-01 (risk tolerance articulated by leadership), there is no objective basis for deciding which Target Profile subcategories are required.

Not integrating with supply chain risk management: GV.SC is the most under-implemented function area in most organizations. Third-party risk assessments are often managed by procurement with no security integration, creating a systematic blind spot. CSF 2.0's explicit GV.SC subcategories provide a forcing function for integrating vendor security into the program.

The bottom line

NIST CSF 2.0 is the most practical starting point for security program governance because it bridges technical controls and executive risk management in a single framework, maps to every other major framework via the OLIR tool, and is explicitly designed for organizations of all sizes. Start with the Govern function to establish risk tolerance and accountability, then build your Current Profile using the 106 subcategories as your evaluation unit. Use the OLIR crosswalks to translate CSF gaps into specific CIS Controls or 800-53 control requirements so remediation work satisfies multiple frameworks simultaneously. Reassess quarterly and present Profile progress to leadership as a percentage of target subcategories at Fully Implemented status.

Frequently asked questions

What is the difference between NIST CSF 2.0 and ISO 27001?

NIST CSF 2.0 is a voluntary framework that describes cybersecurity outcomes and risk management practices; ISO 27001 is a certifiable management system standard with auditable requirements. CSF is broader and more flexible, functioning as a communication and governance tool between security teams and executives. ISO 27001 provides a structured certification path with mandatory documented controls and third-party audit verification. Many organizations use CSF for internal program governance and pursue ISO 27001 certification when customers or regulators require a third-party-validated assurance report.

Is NIST CSF 2.0 mandatory for any organizations?

CSF remains voluntary for private sector organizations, though sector regulators increasingly reference it in guidance. Federal agencies are directed to use NIST frameworks under Executive Order 14028 and OMB memoranda, making CSF alignment effectively mandatory in the federal context. Several state privacy laws and sector regulators (NYDFS, FTC, SEC) reference CSF as an acceptable risk management framework in enforcement contexts, meaning alignment to CSF can serve as evidence of reasonable security practices in regulatory investigations.

What is the new Govern function and why does it matter?

The Govern function addresses the organizational context and accountability structures that enable the other five functions to operate consistently: risk tolerance, policy, roles and responsibilities, and supply chain risk management. It matters because security programs without governance infrastructure tend to operate reactively, with inconsistent prioritization and no formal mechanism for leadership to articulate risk appetite. The Govern function forces security teams to engage executives on risk tolerance before making control investment decisions.

How long does a CSF 2.0 implementation take?

Achieving a well-documented Current Profile takes 4 to 8 weeks for a focused team. Closing gaps to reach a Target Profile depends entirely on the number and nature of gaps identified. Organizations starting from a basic security posture should plan 12 to 24 months to reach Tier 3 governance integration across the most critical business functions. Organizations with existing mature programs using CIS Controls or ISO 27001 can often complete CSF alignment in 2 to 3 months by mapping existing controls to CSF subcategories.

Can small businesses implement NIST CSF 2.0?

Yes. NIST published a Small Business Quick Start Guide for CSF 2.0 specifically addressing resource-constrained organizations. For small businesses, the recommended approach is to focus on IG1-equivalent subcategories: asset inventory, account management, data protection, email security, and basic incident response planning. These high-impact, lower-cost controls address the majority of attack vectors targeting small businesses without requiring enterprise-scale tool investments.

How does NIST CSF 2.0 relate to NIST SP 800-53?

CSF provides the framework structure (functions, categories, subcategories) at an outcome level; NIST 800-53 provides the specific technical and operational controls that implement those outcomes. CSF is the governance layer; 800-53 is the control catalog. The NIST OLIR tool maps every CSF subcategory to the specific 800-53 controls that satisfy it. Organizations subject to FISMA or FedRAMP work primarily in 800-53 and use the OLIR crosswalk to demonstrate CSF alignment without running a separate assessment.

Sources & references

  1. NIST CSF 2.0 Official Publication (NIST CSF 2.0)
  2. NIST: CSF 2.0 Quick Start Guides
  3. CISA: NIST Cybersecurity Framework Resources
  4. NIST SP 800-53 Rev 5: Security and Privacy Controls
  5. NIST: Informative References Crosswalk Tool

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.