In the previous blog, we have gone through the components and features of NIST CSF 1.1. NIST releases new versions of the Cybersecurity Framework (CSF) to address evolving cybersecurity threats, incorporate technological advancements, and integrate feedback from industry practices. These updates ensure the framework remains relevant, effective, and comprehensive, helping product owners to better manage and mitigate emerging risks. NIST released an updated version CSF 2.0 on Feb 2024. In today’s blog, we will uncover the improvements of CSF 2.0 from CSF 1.1.
Key Changes in CSF 2.0
Introduction of GOVERN Function:CSF v2.0 introduces a new function called GOVERN, which includes categories such as Organizational Context, Risk Management Strategy, Roles, Responsibilities, Authorities, Policy, Oversight, and Cybersecurity Supply Chain Risk Management.
Refinement of Categories and Subcategories:Many existing categories and subcategories have been refined for better clarity and alignment with current cybersecurity practices. For instance, Identity Management, Authentication, and Access Control (PR.AA) have been separated from Identity Management and Access Control (PR.AC).
Addition of New Subcategories:To address emerging cybersecurity needs, new subcategories have been added across various functions. Examples include subcategories in GOVERN like GV.RM-07 (Strategic opportunities) and GV.SC-10 (Supply chain security practices integrated into cybersecurity programs).
Enhancements in Existing Functions:Existing functions such as IDENTIFY, PROTECT, DETECT, RESPOND, and RECOVER have seen enhancements with new subcategories and better structuring of existing ones to improve usability and comprehensiveness.
CSF Functions
The new version CSF 2.0 has 6 functions, 22 categories and 106 subcategories while the CSF 1.1 had 5 functions, 23 categories and 108 subcategories. Compared to 1.1 some of the categories are re-aligned and some are removed from the latest version. Let’s see few subcategory details below.

CSF Functions
1. GOVERN (GV)
This function underscores the importance of clear policies, defined roles, and responsibilities to ensure effective oversight. The framework encourages top management involvement, adopting a culture of cybersecurity awareness and commitment. By integrating cybersecurity into the overall governance structure, organizations/product owners can better align their cybersecurity strategies with business objectives, ensuring robust risk management and regulatory compliance. This ensures that cybersecurity measures are not simply reactive but proactive and aligned with the organization’s overall objectives. We will see their subcategories below
Sub Category | Details |
---|---|
Organizational Context (GV.OC) |
|
Risk Management Strategy (GV.RM) |
|
Cybersecurity Supply Chain Risk Management (GV.SC) |
|
Roles, Responsibilities, and Authorities (GV.RR) |
|
Policies, Processes, and Procedures (GV.PO) |
|
Oversight (GV.OV) |
|
2. IDENTIFY (ID)
This function assists organizations/product owners in identifying cybersecurity risks unique to their circumstances and aligning these risks with their broader mission and risk appetite outlined in GOVERN. This ensures that cybersecurity measures are prioritized according to their potential impact on the organization’s goals and objectives.
Sub Category | Details |
---|---|
Asset Management (ID.AM) |
|
Risk Assessment (ID.RA) |
|
Improvement (ID.IM) |
|
3. PROTECT (PR)
This function assists organizations/product owners in establishing safeguards and controls to prevent or lessen the impact of identified threats. It involves activities such as user awareness training, enhancing the resilience of physical and virtual infrastructure, and deploying suitable cybersecurity technologies. The goal is to decrease both the likelihood and severity of cybersecurity incidents by reinforcing the organization's defenses.
Sub Category | Details |
---|---|
Identity Management, Authentication, and Access Control (PR.AA) |
|
Awareness and Training (PR.AT) |
|
Data Security (PR.DS) |
|
Platform Security (PR.PS) |
|
Technology Infrastructure Resilience (PR.IR) |
|
4. DETECT (DE)
To reduce the impact of cybersecurity threats, the DETECT function prioritizes the rapid identification and response to potential threats. This involves employing strong detection mechanisms capable of distinguishing between minor incidents and major breaches. Early detection enables organizations to address issues before they escalate and impose substantial damage.
Sub Category | Details |
---|---|
Continuous Monitoring (DE.CM) |
|
Adverse Event Analysis (DE.AE) |
|
5. RESPOND (RS)
The RESPOND function helps ensure a swift and effective reaction post cybersecurity incident. This involves containing the damage, maintaining stakeholder trust, and safeguarding the organization’s/product owners reputation. An effective incident response relies on having well-defined procedures, clear communication, and prompt actions to minimize losses and quickly restore normal operations.
Sub Category | Details |
---|---|
Incident Management (RS.MA) |
|
Incident Analysis (RS.AN) |
|
Incident Response Reporting and Communication (RS.CO) |
|
Incident Mitigation (RS.MI) |
|
6. RECOVER (RC)
The RECOVER function aims to restore affected assets and operations promptly and efficiently after a cybersecurity incident. This involves recovering compromised systems, retrieving lost data, and taking steps to prevent similar incidents in the future. The objective is to maintain business continuity and reduce the long-term effects of cybersecurity breaches.
Sub Category | Details |
---|---|
Incident Recovery Plan Execution (RC.RP) |
|
Incident Recovery Communication (RC.CO) |
|
NIST CSF 2.0 Reference Tool
NIST offers an online NIST CSF 2.0 Reference Tool (https://csrc.nist.gov/Projects/cybersecurity-framework/Filters#/csf/filters) that allows users to explore the Draft CSF 2.0 Core, including its functions, categories, subcategories, and implementation examples. The tool provides draft Core in both human-readable and machine-readable formats, available in JSON and Excel. Informative References, which will link to other frameworks, are expected to be added shortly.
Conclusion
NIST CSF 2.0 benefits the electronic product industry by providing a structured approach to managing cybersecurity risks, ensuring products are secure by design, and aligning with regulatory requirements. It helps organizations/product owners identify, protect, detect, respond to, and recover from cybersecurity threats. At Embien we support customers by integrating CSF 2.0 guidelines related to identifying, detecting and protecting categories from design to testing. They ensure that products meet cybersecurity standards and implement robust security measures. This collaboration enhances product security, reduces vulnerabilities, and supports compliance.