The Internet’s Most Asked Questions about NIST CSF 2.0 - Alert Logic (2024)

Table of contents

Since the U.S. federal government commissioned the non-regulatory federal agency National Institute of Standards and Technology (NIST) to develop a set of cybersecurity best practices to bolster the nation’s critical infrastructure, the NIST Cybersecurity Framework (CSF) has spread to an estimated one out of every two companies and expanded to include all sectors.

Given that the NIST CSF is entirely voluntary, that’s an impressive feat.

Created in 2013 in response to Presidential Executive Order (EO) 13636, the framework is in its second iteration as NIST CSF 2.0 was released in February of this year. NIST 2.0 comes with modern additions suited for the security needs of a new decade, and openly offers its guidance to companies beyond those involved in “essential government functions.”

As NIST CSF 2.0 adoption continues to spread, so does public interest surrounding how best to leverage it. Following are some of the internet’s most pressing questions about one of cybersecurity’s most popular frameworks, and answers that can help every organization take advantage of it.

1. Do I need a NIST assessment?

If you want your organization’s security strategy to be grounded on a NIST framework, you have to do a NIST assessment. What is a NIST assessment? A NIST assessment is your first initial level-setting exercise to see where your current systems stand in relation to NIST compliance and safety standards. The assessment can be done against any one of the NIST standards, and while it can be done by your own in-house team, it is typically outsourced to an external MSP or cybersecurity provider that offers NIST guidance.

2. How many controls does NIST CSF 2.0 have?

Whereas NIST CSF had five key functions or controls, NIST CSF 2.0 has six. These controls combine to provide comprehensive coverage of the cybersecurity risk management lifecycle and protect crucial information. The inclusion of the new Govern function expands the overall framework to include:

Govern

Establish your cybersecurity policy, expectations, and strategy.

Identify

Discover any elements currently causing risk to your business (vulnerabilities and security weaknesses).

Protect

Implement safeguards to reduce cybersecurity risks.

Detect

Discover any exploits that could potentially cause risk in the future, or are causing risk now (zero days, in-progress attacks).

Respond

Take action against discovered areas of compromise.

Recover

Restore operations to a pre-incident state using a disaster recovery or business continuity plan.

The Internet’s Most Asked Questions about NIST CSF 2.0 - Alert Logic (1)

3. Why the new Govern function?

For 10 years, NIST CSF was known for its “five key functionalities.” So why add Govern, and why add it now? NIST defines the Govern function as “Policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively.” Govern was added to provide clarity, focus, and cohesion to the five other functions and establish the priority of the security goals they seek to achieve. It provides context around what the other functionalities can crystallize on and helps align outcomes at the start.

As Daniel Dukic, Cyber Security Technology Specialist at Microsoft, noted, “The purpose of this update seems [sic] to emphasize the significance of formulating suitable policies and procedures, evaluating and prioritizing potential risks, and outlining the roles and responsibilities within a cybersecurity program. This resonated with me as I have seen firsthand the impact of not having these foundational elements in place.”

The new function is so integral that it replaced “Identify” as the head of the function list. The arrangement places an overarching cybersecurity structure around the subsequent pillars (Identify, Protect, Detect, Respond, and Recover) and emphasizes the importance of knowing where you’re going before taking action.

4. Is NIST 800-53 the same as NIST CSF?

Not exactly.

NIST 800-53 is a very specific set of regulations for federal agencies and contractors and is considered by many to be the gold standard of international cybersecurity regulations (despite its having been commissioned by and for the U.S. government). It is comprehensive, intricate, and popular with larger enterprises with unique compliance requirements, and comprises 1,077 total controls.

NIST CSF, on the other hand, is a more general set of guidelines designed for simplicity, cost-effectiveness, and adaptability, making it perfect for widespread use and smaller companies looking to align with a set of industry-recognized cybersecurity best practices. It has a relatively shorter list of 108 security controls.

5. Are NIST standards mandatory?

Some. And it depends on who you are.

NIST 800-53: Yes, for federal agencies and contractors

Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, mandated NIST 800-53 compliance for all federal agencies since its issuance in 2017, and NIST 800-171 is now mandatory under Cybersecurity Maturity Model Certification (CMMC) guidelines.

This goes for federal contractors, as well. Anyone doing business with the U.S. federal government must comply with NIST cybersecurity standards. In addition, government agencies and their contractors are typically held accountable for complying with all NIST Special Publications as well. This includes:

  • NIST 800-53 | Guidelines for privacy and data security controls
  • NIST 800-171 | This Special Publication underpins the CMMC, a mandatory security standard for all Department of Defense (DoD) contractors and any organizations in their supply chain.

NIST CSF 2.0 — No, optional for all

For everyone else, NIST CSF 2.0 compliance is voluntary. Even at its initial release in 2013, the NIST Cybersecurity Framework was an optional guideline for organizations within the U.S.’ critical infrastructure sectors. However, the framework proved so useful that only two years later, it was estimated that one in three of all U.S. organizations adopted it – even those outside the scope of critical infrastructure.

Part of the mass appeal of this voluntary framework is that you don’t have to start from scratch when building out your cybersecurity strategy. Organizations that adopt NIST CSF 2.0 have a flexible, government-level security standard on which to model their security controls, build out their policies, and prevent against advanced exploits like never-before-seen emerging threats and advanced persistent threats (APTs).

6. What is the difference between NIST CSF and RMF?

These two separate, but dually useful, frameworks are designed to support each other and not compete.

The NIST Risk Management Framework (RMF) focuses exclusively on risk management practices and is mandatory for federal agencies and any organization that handles federal data. It presents a comprehensive, systematic approach to managing risks based on business objectives, risk appetite, and specific requirements, and focuses on six key areas:

Categorize

Define and prioritize your risks from greatest to least.

Select

Find which security controls are right for the job and will minimize those key risks.

Implement

Decide how those controls are going to be actioned and action them.

Assess

Make sure the controls are doing their job and fix any errors.

Authorize

Give your newly risk-protected system permission to operate.

Monitor

Collect regular data on how the system, your policies, and the overall risk management program is achieving its goals.

By comparison, NIST CSF is a more general approach to improving an organization’s cybersecurity posture in general and can be used in conjunction with the more risk specific NIST RMF.

7. How does NIST define a Privacy Impact Assessment (PIA)?

Generally, a PIA determines how Personally Identifiable Information (PII) is used, stored, and managed within an organization. It should accomplish three things:

  • Ensure the entity conforms to all privacy requirements
  • Identify the risks and effects of handling said sensitive data
  • Look at any other ways of handling the private data that could mitigate risk further

NIST notes that PIAs can be submitted as supporting references to security and privacy plans required under the “Authorization” stage of its Risk Management Framework.

8. Can you map NIST to compliance controls like PCI DSS?

Yes. In fact, you should.

The PCI Security Standards Council said they and NIST “share the common goal of enhancing data security” and released an instructional guide to help organizations through the process of mapping PCI DSS v3.2.1 to NIST CSF. The document covers which PCI DSS requirements coincide with NIST CSF outcomes under the Identify, Protect, Detect, Respond, and Recover functions. As it states, “the mapping can help identify where the implementation of a particular security control can support both a PCI DSS requirement and a NIST Framework outcome.” While that document was the latest published content for mapping, third-party mappings of PCI DSS 4.0 to NIST CSF are currently available in private offerings or via vendor compliance consultations.

9. How does CIS Controls v8 compare to NIST CSF 2.0?

The Center for Internet Security (CIS) has a resource mapping NIST CSF to CIS Controls v8. In essence, the two frameworks are highly similar, as the documents suggest, and overlap on a number of key issues including maintaining a detailed inventory of assets, keeping a software inventory, establishing a secure data management process, and implementing a secure configuration process.

However, in practice, the two frameworks have their differences. The CIS Controls are viewed as more prescriptive, and so may work better for smaller organizations looking for general “foundational security measures … to achieve essential [cyber] hygiene.” NIST CSF 2.0, while more flexible than NIST 800-53, is still a systematic methodology of specific practices that is customizable based on the needs of an organization, making it ideal for larger, more established organizations looking to cater to custom sector needs, budgets, and risk tolerances.

Fortra Supports NIST CSF 2.0

Both Fortra’s Alert Logic and other Fortra solutions offer services to help organizations Govern, Identify, Protect, Detect, Respond, and Recover as related to NIST CSF 2.0. For more information, reach out to one of Alert Logic’s SMEs.

The Internet’s Most Asked Questions about NIST CSF 2.0 - Alert Logic (2024)

FAQs

What are the cons of NIST CSF? ›

The downside to the NIST CSF is that its brevity makes it incompatible with common compliance requirements, such as NIST 800-171, GDPR, CPRA/CCPA and PCI DSS (depending on SAQ level). For those, more comprehensive frameworks, such as NIST 800-53 or ISO 27002 are recommended.

What are the 5 pillars of NIST CSF? ›

It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection. You can put the NIST Cybersecurity Framework to work in your business in these five areas: Identify, Protect, Detect, Respond, and Recover.

Which core function of the NIST CSF addresses processes and procedures that should be followed during cybersecurity incidents that have been detected? ›

The Respond function focuses on appropriate activities to take action in case of a detected cybersecurity incident and supports the ability to contain the impact of a potential cybersecurity incident.

What are the five core functions defined in NIST CSF? ›

This framework profile comprises the Framework Core, Profiles, and NIST Implementation Tiers. Here, we'll dive into the Framework Core and the five core functions: Identify, Protect, Detect, Respond, and Recover.

Is NIST CSF mandatory? ›

Compliance with the NIST Cybersecurity Framework is not mandatory. It is a voluntary guidance document that organizations can choose to adopt to enhance cybersecurity practices, such as incident response and recovery activities, and align with industry standards.

Why the NIST CSF is a decent framework to implement? ›

The CSF helps manage and reduce cybersecurity risks with a taxonomy of high-level outcomes that any organization can use to understand, assess, prioritize, and communicate its cybersecurity efforts. It also links to resources that provide additional guidance on practices and controls for achieving security outcomes.

Does NIST CSF have controls? ›

The protect function of the NIST CSF involves creating and implementing controls and processes that safeguard sensitive information and key systems while also mitigating risks.

How many controls does NIST CSF have? ›

NIST Cybersecurity Framework overview

The core comprises five functions, which are subdivided into 22 categories (groups of cyber security outcomes) and 98 subcategories (security controls).

Is NIST CSF a risk assessment? ›

NIST CSF 2.0 as a maturity assessment tool. Beyond its original scope in cyber risk management, the NIST CSF has also been applied as a strategic planning tool to assess cybersecurity risks and current practices.

What is the NIST 2.0 framework? ›

Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The NIST Cybersecurity Framework 2.0 has emerged not just as an update, but also as a transformative approach to securing digital assets and infrastructures.

What is the NIST CSF 2.0 course? ›

The NIST Cybersecurity Framework 2.0 provides a policy framework of computer security guidance for how private sector organizations in the United States and around the world can assess and improve their ability to prevent, detect, and respond to cyber attacks.

When was NIST CSF 2.0 released? ›

The current version of the NIST Cybersecurity Framework in the the NIST Cybersecurity Framework 2.0, released on February 26. What is the order of the NIST Cybersecurity Framework? The order of the NIST Cybersecurity Framework is divided into five separate functions: Identify, Protect, Detect, Respond and Recover.

What is NIST CSF based on? ›

The CSF uses a simple structure with just five key functions: Identify, Protect, Detect, Respond, and Recover. Each function uses clear, outcome-based language without extensive technical detail. The CSF also outlines a simple process to help improve your cybersecurity program.

What is the NIST CSF summary? ›

The NIST Cybersecurity Framework (CSF) 2.0 can help organizations manage and reduce their cybersecurity risks as they start or improve their cybersecurity program. The CSF outlines specific outcomes that organizations can achieve to address risk.

What is the difference between NIST CSF and CIS controls? ›

CIS and NIST frameworks share many similarities. Still, they are fundamentally different frameworks. For example, the CIS Controls are a Control framework, while the NIST Cybersecurity Framework is a Program framework. This difference is crucial when determining a framework's best use case.

Is NIST CSF good? ›

The NIST CSF is the most reliable security measure for building and iterating a cybersecurity program to prepare for new updates to existing standards and regulations.

What are some of the consequences for not following NIST requirements? ›

Consequences of non-compliance with NIST standards are:
  • Loss of Business: When your data is compromised, your status as a government contractor could be in jeopardy. ...
  • Impacted Productivity: Your company's productivity levels, in the case of a serious data breach, could be greatly impacted.

Is NIST a reliable source? ›

Because UTC(NIST) is a national measurement standard and a national resource important to many users and industries, its reliability is of the utmost importance.

What is a CSF audit against NIST? ›

A NIST Assessment usually involves two to determine adherence to a framework. The first part is a NIST Audit to establish the level of conformance to a standard. The evaluator performing the NIST Audit will work from the guidance to ensure the organization has the required controls and standards in place.

Top Articles
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6683

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.