In the previous blog, we have gone through the components and features of NIST CSF 1.1. NIST releases new versions of the Cybersecurity Framework (CSF) to address evolving cybersecurity threats, incorporate technological advancements, and integrate feedback from industry practices. These updates ensure cybersecurity frameworks remain relevant, effective, and comprehensive, helping product owners to better manage and mitigate emerging risks. NIST released an updated version — NIST CSF 2.0 — on Feb 2024. In today's blog, we will uncover the improvements of NIST CSF 2.0 from CSF 1.1.
Key Changes in NIST CSF 2.0
Introduction of GOVERN Function:NIST CSF 2.0 introduces a new function called GOVERN, which includes categories such as Organizational Context, Risk Management Strategy, Roles, Responsibilities, Authorities, Policy, Oversight, and Cybersecurity Supply Chain Risk Management. The NIST CSF 2.0 GOVERN function for organizations establishes accountability at the governance level and ensures that cybersecurity is treated as a business priority rather than just a technical concern.
Refinement of Categories and Subcategories:Many existing categories and subcategories of cybersecurity frameworks have been refined for better clarity and alignment with current cybersecurity practices. For instance, Identity Management, Authentication, and Access Control (PR.AA) have been separated from Identity Management and Access Control (PR.AC).
Addition of New Subcategories:To address emerging cybersecurity needs, new subcategories have been added across various CSF functions. Examples include subcategories in GOVERN like GV.RM-07 (Strategic opportunities) and GV.SC-10 (Supply chain security practices integrated into cybersecurity programs).
Enhancements in Existing Functions:Existing CSF functions such as IDENTIFY, PROTECT, DETECT, RESPOND, and RECOVER have seen enhancements with new subcategories and better structuring of existing ones to improve usability and comprehensiveness. Together with GOVERN, NIST CSF 2.0 now has 6 CSF functions that provide a complete framework core for organizational cybersecurity risk management.
CSF Functions
NIST CSF 2.0 has 6 CSF functions, 22 categories and 106 subcategories while CSF 1.1 had 5 CSF functions, 23 categories and 108 subcategories. Compared to 1.1, some of the categories are re-aligned and some are removed from the latest version. The framework core of NIST CSF 2.0 is designed to be scalable, applicable across all sectors and organization sizes. Let's see a few subcategory details below.
CSF Functions
1. GOVERN (GV)
This CSF function underscores the importance of clear policies, defined roles, and responsibilities to ensure effective oversight. The NIST CSF 2.0 GOVERN function for organizations encourages top management involvement, adopting a culture of cybersecurity awareness and commitment. By integrating cybersecurity into the overall governance structure — a cornerstone of modern cybersecurity frameworks — organizations and product owners can better align their cybersecurity strategies with business objectives, ensuring robust risk management and regulatory compliance. This ensures that cybersecurity measures are not simply reactive but proactive and aligned with the organization's overall objectives. We will see their subcategories below:
| Sub Category | Details |
|---|---|
| Organizational Context (GV.OC) |
|
| Risk Management Strategy (GV.RM) |
|
| Cybersecurity Supply Chain Risk Management (GV.SC) |
|
| Roles, Responsibilities, and Authorities (GV.RR) |
|
| Policies, Processes, and Procedures (GV.PO) |
|
| Oversight (GV.OV) |
|
2. IDENTIFY (ID)
This CSF function assists organizations and product owners in identifying cybersecurity risks unique to their circumstances and aligning these risks with their broader mission and risk appetite outlined in GOVERN. This ensures that cybersecurity measures are prioritized according to their potential impact on the organization's goals and objectives. It is a foundational element of the framework core of NIST CSF 2.0.
| Sub Category | Details |
|---|---|
| Asset Management (ID.AM) |
|
| Risk Assessment (ID.RA) |
|
| Improvement (ID.IM) |
|
3. PROTECT (PR)
This CSF function assists organizations and product owners in establishing safeguards and controls to prevent or lessen the impact of identified threats. It involves activities such as user awareness training, enhancing the resilience of physical and virtual infrastructure, and deploying suitable cybersecurity technologies. The goal is to decrease both the likelihood and severity of cybersecurity incidents by reinforcing the organization's defenses — as defined in the framework core of NIST CSF 2.0.
| Sub Category | Details |
|---|---|
| Identity Management, Authentication, and Access Control (PR.AA) |
|
| Awareness and Training (PR.AT) |
|
| Data Security (PR.DS) |
|
| Platform Security (PR.PS) |
|
| Technology Infrastructure Resilience (PR.IR) |
|
4. DETECT (DE)
To reduce the impact of cybersecurity threats, the DETECT CSF function prioritizes the rapid identification and response to potential threats. This involves employing strong detection mechanisms capable of distinguishing between minor incidents and major breaches. Early detection enables organizations to address issues before they escalate and impose substantial damage — a key principle of NIST CSF 2.0 and modern cybersecurity frameworks.
| Sub Category | Details |
|---|---|
| Continuous Monitoring (DE.CM) |
|
| Adverse Event Analysis (DE.AE) |
|
5. RESPOND (RS)
The RESPOND CSF function helps ensure a swift and effective reaction post cybersecurity incident. This involves containing the damage, maintaining stakeholder trust, and safeguarding the organization's reputation. An effective incident response relies on having well-defined procedures, clear communication, and prompt actions to minimize losses and quickly restore normal operations — all embedded in the framework core of NIST CSF 2.0.
| Sub Category | Details |
|---|---|
| Incident Management (RS.MA) |
|
| Incident Analysis (RS.AN) |
|
| Incident Response Reporting and Communication (RS.CO) |
|
| Incident Mitigation (RS.MI) |
|
6. RECOVER (RC)
The RECOVER CSF function aims to restore affected assets and operations promptly and efficiently after a cybersecurity incident. This involves recovering compromised systems, retrieving lost data, and taking steps to prevent similar incidents in the future. The objective is to maintain business continuity and reduce the long-term effects of cybersecurity breaches — completing the framework core of NIST CSF 2.0.
| Sub Category | Details |
|---|---|
| Incident Recovery Plan Execution (RC.RP) |
|
| Incident Recovery Communication (RC.CO) |
|
NIST CSF 2.0 Reference Tool
NIST offers an online NIST CSF 2.0 Reference Tool (https://csrc.NIST.gov/Projects/cybersecurity-framework/Filters#/CSF/filters) that allows users to explore the Draft CSF 2.0 Core, including its CSF functions, categories, subcategories, and implementation examples. The tool provides draft Core in both human-readable and machine-readable formats, available in JSON and Excel. Informative References, which will link to other cybersecurity frameworks, are expected to be added shortly.
Embien’s Digital Transformation Services and Cybersecurity Services support NIST CSF 2.0, ensuring secure and resilient system development.
Conclusion
NIST CSF 2.0 benefits the electronic product industry by providing a structured approach to managing cybersecurity risks across all six CSF functions, ensuring products are secure by design, and aligning with regulatory requirements. It helps organizations and product owners identify, protect, detect, respond to, and recover from cybersecurity threats — all governed by the new NIST CSF 2.0 GOVERN function for organizations. The framework core of NIST CSF 2.0 makes these cybersecurity frameworks actionable at every level of an organization. At Embien we support customers by integrating CSF 2.0 guidelines related to identifying, detecting and protecting categories from design to testing. We ensure that products meet cybersecurity standards and implement robust security measures aligned with the framework core of NIST CSF 2.0. This collaboration enhances product security, reduces vulnerabilities, and supports compliance.
