In February of 2024, NIST released version 2.0 of their Cybersecurity Framework, NIST CSF 2.0. This is the first major update since its creation back in 2014. All businesses and organizations now have a suite of resources that can help them achieve their cybersecurity goals, with added emphasis on governance.
So what does this mean for you and your business? Don’t sweat it, we’re here to help.
If you're less familiar with NIST and CSF...
NIST is the National Institute of Standards and Technology, a government agency that is part of the U.S. Department of Commerce. More than a decade ago, NIST was tasked by Executive Order (EO 13636) with developing a framework to reduce risks to critical infrastructure. This resulted in the first Cybersecurity Framework called NIST CSF.
At its core, NIST CSF was created to reduce cybersecurity risks and help organizations better manage them. Although the first version of the framework was communicated as a tool for people in any sector or community – the real target audience was those working in the public sector.
“Developed by working closely with stakeholders and reflecting the most recent cybersecurity challenges and management practices, this update aims to make the framework even more relevant to a wider swath of users in the United States and abroad,”
Kevin Stine, chief of NIST’s Applied Cybersecurity Division.
That brings us to the update, NIST CSF 2.0, a cybersecurity framework that can be used by all types of organizations to:
Version 2.0 brings numerous additions, removals, or modifications across the framework’s
Although the update is comprehensive, we think certain changes are particularly noteworthy and worth highlighting.
Out of everything that’s new, “Implementation Examples” might be one of the most helpful. NIST CSF 2.0 includes illustrative examples for each of its Subcategories, making the framework more actionable and user-friendly than before.
For example, if a Subcategory reads that an organization identifies vulnerabilities then an Implementation Example might read that the organization regularly conducts vulnerability scans to identify unpatched or misconfigured software.
A few more include:
FUNCTION | CATEGORY | SUBCATEGORY | IMPLEMENTATION EXAMPLE |
Govern |
Organizational Content (GV.OC) |
The organizational mission is understood and informs cybersecurity risk management | Ex1: Share the organization’s mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission |
Protect |
Identity Management, Authentication, and Access Control (PR.AA) |
Identities are proofed and bound to credentials based on the context of interactions | Ex1: Verify a person’s claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver’s license) Ex2: Issue a different credential for each person (i.e., no credential sharing) |
Respond |
Incident Management (RS.MA) |
Incident reports are triaged and validated |
Ex1: Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities |
Recover |
Incident Recovery Plan Execution (RC.RP) |
The integrity of backups and other restoration assets is verified before using them for restoration | Ex1: Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use |
This really helps take the guess work out of how to apply the framework. The list is quite comprehensive and can be downloaded as a PDF or Excel spreadsheet directly from NIST’s website.
2. GOVERNANCE
The other notable change in version 2.0 is the emphasis on governance. How much emphasis you might be wondering? Quite a bit. NIST added govern as a function, bringing the total number of functions to six. But before you think of this addition linearly, the govern function sits on top of the previous five functions.
SOURCE: NIST
Why was it added? The Govern function helps organizations prioritize actions across the other five areas, assign roles and responsibilities to encourage tighter procedures, and achieve oversight into cybersecurity strategy.
It’s kind of like taking the voice of each of the five functions and making sure there is a cohesive story to be told. If the other functions cover the actions a cybersecurity team needs to take, then the Govern function provides guidance for organizing a team that gets those things done in a consistent manner and without contradicting other efforts.
3. RESPOND AND RECOVER
Reflecting on the early days of NIST CSF and even version 1.1, the Respond and Recover functions didn’t get much spotlight. Now, with NIST CSF 2.0, there’s a stronger focus on these areas, emphasizing the need for cyber-resilient systems that not only prevent attacks but also ensure quick recovery.
This shift makes sense given today’s landscape. Cyber threats are more complex now compared to 2014. These days, it's not about if you’ll face a ransomware attack, but how you’ll respond when it happens. Back in the early 2010s, the main concern was resuming business operations after a natural disaster. Today, companies can shift their knowledge workers to remote setups and keep things running smoothly.
And while businesses adapt to evolving threats, cybercriminals are also getting more sophisticated. For example, many now use dual extortion tactics, where they not only encrypt your data but also threaten to release it if the ransom isn’t paid. This heightened level of threat is why there’s a greater emphasis on Respond and Recover in the latest version of the framework.
If you’re already well-versed in the world of NIST CSF, Secure Compliance Solutions can be an extra pair of hands to help you achieve your cybersecurity goals and identify where you’re no longer compliant with version 2.0.
If you’re completely new to the framework, SCS can help you map out everything from start to finish so you can identify where you’re compliant, where you’re not and then what to do about it. We can demystify NIST CSF and make cybersecurity less intimidating overall.
“CSF 2.0 is not just about one document. It's about a suite of resources that can be customized and used individually or in combination over time as an organization’s cybersecurity needs change and its capabilities evolve.”
Laurie E. Locascio, Under Secretary of Commerce for Standards and Technology and NIST Director
-------------------------------------------