NIST Framework Cheatsheet
NIST Framework Cheatsheet
Professionals
The National Institute of Standards and Technology has updated its Cybersecurity Framework for
2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a
decade ago, was created with the goal of expanding the primary audience from critical
infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure
uniform protection of all U.S. cyber assets.
TechRepublic’s cheat sheet about the NIST CSF is an overview of this new government
recommended best practice, and it includes steps on implementing the security framework.
Does the NIST Cybersecurity Framework apply outside of the United States?
Although the NIST CSF is a publication of the U.S. government, it may be useful to businesses
internationally. The NIST CSF is aligned with the International Organization for Standardization
and the International Electrotechnical Commission. Version 2.0 will likely be translated by
community volunteers in the future, NIST said. The cybersecurity outcomes described in the CSF
are “sector-, country-, and technology-neutral,” NIST wrote in Version 2.0.
What’s new in Version 2.0 of the NIST Cybersecurity
Framework?
Version 2.0 of the NIST CSF expands the scope of the framework from critical infrastructure to
organizations in every sector and adds new emphasis on governance. The governance portion
positions cybersecurity as one of the most important sources of enterprise risk that senior business
leaders should consider, alongside finance, reputation and others.
The NIST CSF 2.0 includes Quick Start guides, reference tools and organizational and community
profile guides. The reference tools were created to provide organizations a simplified way to
implement the CSF compared to Version 1.1.
Version 2.0 of the NIST CSF adds:
• The Function of “Govern,” which focuses on how organizations can make informed decisions
regarding their cybersecurity strategy
• Implementation Examples and Informative References, which will be updated online regularly
• Organizational Profiles, which may help them determine their current status in terms of
cybersecurity and what status they might want to move to.
Cybersecurity Framework?
As of Version 2.0 of the NIST framework, these are the six core activities: Identify, protect, detect,
respond, recover and govern. These activities, or functions, of the NIST framework are used to
organize cybersecurity efforts at the most basic level.
Core
The core component is “a set of activities to achieve specific cybersecurity outcomes, and
references examples of guidance to achieve those outcomes.” It is further broken down into three
elements: Functions, categories and subcategories.
• Functions: This section explains the six functions: Identify, protect, detect, respond, recover and
govern (Figure A). Together, these six functions form a top-level approach to securing systems
and responding to threats. Think of them as your basic incident management tasks.
Figure A
• Categories: Each function contains categories used to identify specific tasks or challenges
within it. For example, the protect function could include access control, identity management,
data security and platform security.
• Subcategories: These are further divisions of categories with specific objectives. The data
security category could be divided into tasks like protecting data at rest, in transit and in use or
creating, protecting, maintaining and testing backups.
Organizational Profiles
Profiles are both outlines of an organization’s current cybersecurity status and roadmaps toward
CSF goals for stronger security postures (Figure B). NIST said having multiple profiles — current
and goal — can help an organization find weak spots in its cybersecurity implementations and make
moving from lower to higher tiers easier.
Figure B
NIST suggests using the Organizational Profiles as an ongoing assessment of an organization’s
cybersecurity maturity. Image: NIST
Profiles help connect the functions, categories and subcategories to business requirements, risk
tolerance and resources of the larger organization it serves.
Tiers
There are four tiers of implementation, and while CSF documents don’t consider them maturity
levels, the higher tiers are considered more complete implementation of CSF standards for
protecting critical infrastructure. NIST considers Tiers useful for informing an organization’s
current and target Profiles.
• Tier 1: Called partial implementation, organizations at Tier 1 have an ad-hoc and reactive
cybersecurity posture to protect their data. They have little awareness of organizational
cybersecurity risk and any plans implemented are often done inconsistently.
• Tier 2: At the tier called risk-informed, organizations may be approving cybersecurity measures,
but implementation is still piecemeal. They are aware of risks, have plans and have the proper
resources to protect themselves from a data breach, but haven’t quite gotten to a proactive point.
• Tier 3: The third tier is called repeatable, meaning that an organization has implemented NIST
CSF standards company-wide and is able to repeatedly respond to cyber crises. Policy is
consistently applied, and employees are informed of risks.
• Tier 4: Called adaptive, this tier indicates total adoption of the NIST CSF. Adaptive
organizations aren’t just prepared to respond to cyber threats — they proactively detect threats
and predict issues based on current trends and their IT architecture.
Informative References and other online resources
The Informative References provided with Version 2.0 of the CSF are documentation, steps for
execution, standards and other guidelines. A prime example in the manual Windows update
category would be a document outlining steps to manually update Windows PCs. In Version 2.0,
Informative References, Implementation Examples and Quick-Start Guides can be found through
the NIST CSF website or the CSF document.