Learn Search

Search across all Learn content

← Back to Whitepapers

Implementing NIST 2.0 with SanerNow

Introduction

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0 is the latest version of a voluntary framework that provides organizations with guidelines and best practices for managing and reducing cybersecurity risks. Originally developed in response to Executive Order 13636 in 2013, the NIST CSG has evolved to address the ever-changing landscape of cyber threats and technologies. NIST CSF 2.0 aims to help organizations of all sizes and sectors better understand, manage, and mitigate cybersecurity risks through a flexible, cost-effective approach.

An Overview

NIST CSF 2.0 is structured around five core functions: Identify, Protect, Detect, Respond, and Recover. These functions are further divided into categories and subcategories that cover specific areas of cybersecurity. This framework also includes implementation tiers that help organizations assess their current cybersecurity posture and set goals for improvement.

Building on previous versions, CSF 2.0 contains new features that highlight the importance of governance and supply chains. Special attention is paid to the QSGs to ensure that the CSF is relevant and readily accessible by smaller organizations as well as their larger counterparts.


Key Differences Between NIST CSF 1.1 and NIST CSF 2.0

AspectNIST CSF 1.1NIST CSF 2.0
Scope and IntegrationFocused primarily on risk management and cybersecurityExpanded to emphasize the importance of cyber governance
Supply Chain SecurityBasic inclusion of supply chain risk managementGreater emphasis on supply chain resilience and security
Implementation ExamplesLimited guidance on how to achieve subcategoriesIntroduces an “Implementation Examples” category for practical guidance
Governance FunctionNo specific governance function: governance principles are dispersedIntroduces a new “GOVERN” function to highlight cybersecurity governance
References to FrameworksMinimal references to other frameworksIncludes references to reputable frameworks, such as NIST Privacy Framework and NICE Workforce Framework
Continuous ImprovementGeneral emphasis on improvement without a specific categoryAdds an “improvement category” within the IDENTIFY function

Challenges of Implementing NIST CSF

Complexity

The framework’s comprehensive nature is overwhelming, especially for organizations with limited cybersecurity expertise.

Resource Intensive

Implementing and maintaining the framework requires significant time, effort, and financial resources.

Resource Intensive

Integrating NIST CSF 2.0 with existing processes and technologies is difficult, particularly in organizations with outdated computer systems still in use.

Continuous Improvement

The dynamic nature of cybersecurity threats necessitates continuous monitoring, assessment, and improvement, which can be resource intensive.

Compliance and Documentation

Maintaining compliance with the framework involves extensive documentation and regular audits, adding to the administrative burden.

Key Changes in NIST CSF 2.0

Increased Scope

The first notable change in NIST CSF 2.0 is the removal of "critical infrastructure" from its name. Originally aimed at protecting critical infrastructure, the framework now targets all organizations, reflecting its widespread adoption. A SANS Institute survey highlights this, showing 74% of organizations using a security framework choose the CSF.

Govern Function

The new “govern” function in CSF 2.0 marks a strategic shift towards emphasizing governance in cybersecurity. It calls for cohesive strategies and policies that align with organizational goals. By consolidating existing categories and subcategories into this function, it encourages executive leadership to take an active role in cybersecurity.

Supply Chain Risk Management

CSF 2.0 gives more guidance on managing supply chain risks, highlighting the need to secure complex and interconnected supply chains. Organizations should examine their suppliers' cybersecurity practices and develop risk management strategies that go beyond their own operations. This holistic approach helps protect against the widespread effects of a breach anywhere in the supply chain.

Measuring Cybersecurity Outcomes

The updated CSF 2.0 focuses more on measuring cybersecurity results. It provides detailed advice on creating metrics and benchmarks to gauge the effectiveness of cybersecurity practices. These metrics help organizations make data-driven security decisions, guided by measurable achievements in defending against cyber threats.

Organizational Risk Management

CSF 2.0 emphasizes integrating cybersecurity risk management with overall organizational risk strategies. It encourages viewing cybersecurity as part of the broader risk landscape, influencing various business decisions and goals. This approach ensures cybersecurity risks are considered within the context of enterprise-wide risk management.

Profile Development Guidance

The updated framework provides more support for developing profiles, including new templates and examples. This helps organizations tailor the CSF to their specific needs, creating a customized plan for improving cybersecurity. This guidance is valuable for aligning security measures with unique risks.

Framework Tiers Classification

CSF 2.0 clearly defines the framework tires, or maturity levels, and their purposes, resolving previous ambiguities. These tiers help organizations understand and plan their cybersecurity strategy, aligning practices with risk management processes and business needs. Clear definitions ensure organizations can accurately assess their current capabilities and plan for improvement.

The SanerNow Approach to NIST CSF 2.0 Framework

SecPod SanerNow Continuous Vulnerability and Exposure Management solution is built to give complete visibility and control over your modern security landscape. SanerNow runs the fastest scans to discover IT assets, vulnerabilities, exposures, misconfigurations, and other security risks. With its integrated patch management, it provides the necessary remediation fixes to mitigate them, and automates tasks end-to-end to make it a simple and hassle-free daily routine.

SanerNow allows you to assess, validate, and communicate adherence to NIST 2 security control. SanerNow delivers broad, up-to-date, and continuous coverage to NIST 2 standards across your enterprise, including cloud and mobile environment. It automates the majority of NIST 2 controls, enabling you to efficiently put together the six functions of the framework: Govern, Identify, Protect, Detect, Respond, and Recover.

The CSF Core Functions

Govern

The Govern (GV) function involves setting, communicating, and monitoring an organization's cybersecurity risk management strategy and policies. It helps guide the organization in achieving its cybersecurity goals in line with its mission and stakeholder expectations. Govern ensures cybersecurity is part of the broader enterprise risk management (ERM) strategy, covering organizational context, strategy, supply chain risk management, roles, responsibilities, policies, and oversight of cybersecurity efforts.

Identify

The Identify (ID) function involves understanding the organization's current cybersecurity risks. This includes knowing the assets (like data, hardware, software, systems, facilities, services, and people) and suppliers, as well as the related cybersecurity risks. By doing this, the organization can prioritize its efforts according to its risk management strategy and mission needs set out in Govern. This function also involves finding ways to improve policies, plans, processes, procedures, and practices to better manage cybersecurity risks across all six functions.

Protect

The Protect (PR) function involves using safeguards to manage an organization's cybersecurity risks. After identifying and prioritizing assets and risks, Protect focuses on securing those assets to prevent or minimize the impact of adverse cybersecurity events and to capitalize on opportunities. This includes identity management, authentication, access control, awareness and training, data security, platform security (hardware, software, services), and the resilience of technology infrastructure.

Detect

The Detect (DE) function involves identifying and analyzing possible cybersecurity attacks and compromises. It aims to discover and analyze anomalies, indicators of compromise, and other events that suggest cybersecurity incidents. This function supports timely incident response and recovery.

Respond

The Respond (RS) function involves taking action when a cybersecurity incident is detected. It focuses on containing the incident's effects and includes incident management, analysis, mitigation, reporting, and communication.

Recover

The Recover (RC) function involves restoring assets and operations affected by a cybersecurity incident. It aims to quickly return to normal operations, reduce the incident's impact, and ensure effective communication during recovery efforts.


The Broad NIST CSF 2.0 Coverage

SL.NONIST 2.0 ControlsSub-category
GOVERN (GV)The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
Organizational Context (GV.OC)The circumstances — mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements — surrounding the organization’s cybersecurity risk management decisions are understood
1GV.OC-01The organizational mission is understood and informs cybersecurity risk management
2GV.OC-02Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
3GV.OC-03Legal, regulatory, and contractual requirements regarding cybersecurity — including privacy and civil liberties obligations — are understood and managed
4GV.OC-04Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
5GV.OC-05Outcomes, capabilities, and services that the organization depends on are understood and communicated
Risk Management Strategy (GV.RM)The organization’s priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
6GV.RM-01Risk management objectives are established and agreed to by organizational stakeholders
7GV.RM-02Risk appetite and risk tolerance statements are established, communicated, and maintained
8GV.RM-03Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
9GV.RM-04Strategic direction that describes appropriate risk response options is established and communicated
10GV.RM-05Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
11GV.RM-06A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
12GV.RM-07Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
Roles, Responsibilities, and Authorities (GV.RR)Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
13GV.RR-01Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
14GV.RR-02Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
15GV.RR-03Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
16GV.RR-04Cybersecurity is included in human resources practices
Policy (GV.PO)Organizational cybersecurity policy is established, communicated, and enforced
17GV.PO-01Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
18GV.PO-02Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
Oversight (GV.OV)Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
19GV.OV-01Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
20GV.OV-02The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
21GV.OV-03Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
Cybersecurity Supply Chain Risk Management (GV.SC)Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
22GV.SC-01A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
23GV.SC-02Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
24GV.SC-03Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
25GV.SC-04Suppliers are known and prioritized by criticality
26GV.SC-05Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
27GV.SC-06Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
28GV.SC-07The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
29GV.SC-08Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
30GV.SC-09Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
31GV.SC-10Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
IDENTIFY (ID)The organization’s current cybersecurity risks are understood
Asset Management (ID.AM)Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization’s risk strategy
32ID.AM-01Inventories of hardware managed by the organization are maintained
33ID.AM-02Inventories of software, services, and systems managed by the organization are maintained
34ID.AM-03Representations of the organization’s authorized network communication and internal and external network data flows are maintained
35ID.AM-04Inventories of services provided by suppliers are maintained
36ID.AM-05Assets are prioritized based on classification, criticality, resources, and impact on the mission
37ID.AM-06Inventories of data and corresponding metadata for designated data types are maintained
38ID.AM-07Systems, hardware, software, services, and data are managed throughout their life cycles
Risk Assessment (ID.RA)The cybersecurity risk to the organization, assets, and individuals is understood by the organization
39ID.RA-01Vulnerabilities in assets are identified, validated, and recorded
40ID.RA-02Inventories of software, services, and systems managed by the organization are maintained
41ID.RA-03Internal and external threats to the organization are identified and recorded
42ID.RA-04Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
43ID.RA-05Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
44ID.RA-06Risk responses are chosen, prioritized, planned, tracked, and communicated
45ID.RA-07Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
46ID.AM-08Processes for receiving, analyzing, and responding to vulnerability disclosures are established
47ID.RA-09The authenticity and integrity of hardware and software are assessed prior to acquisition and use
48ID.RA-10Critical suppliers are assessed prior to acquisition
Improvement (ID.IM)Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
49ID.IM-01Improvements are identified from evaluations
50ID.IM-02Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
51ID.IM-03Improvements are identified from execution of operational processes, procedures, and activities
52ID.IM-04Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
PROTECT (PR)Safeguards to manage the organization’s cybersecurity risks are used
Identity Management, Authentication, and Access Control (PR.AA)Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access
53PR.AA-01Identities and credentials for authorized users, services, and hardware are managed by the organization
54PR.AA-02Identities are proofed and bound to credentials based on the context of interactions
55PR.AA-03Users, services, and hardware are authenticated
56PR.AA-04Identity assertions are protected, conveyed, and verified
57PR.AA-05Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
58PR.AA-06Physical access to assets is managed, monitored, and enforced commensurate with risk
Awareness and Training (PR.AT)The organization’s personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
59PR.AT-01Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
60PR.AA-02Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
Data Security (PR.DS)Data are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information
61PR.DS-01Identity assertions are protected, conveyed, and verified
62PR.DS-02The confidentiality, integrity, and availability of data-in-transit are protected
63PR.DS-10The confidentiality, integrity, and availability of data-in-use are protected
64PR.DS-11Backups of data are created, protected, maintained, and tested
Platform Security (PR.PS)The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization’s risk strategy to protect their confidentiality, integrity, and availability
65PR.PS-01Configuration management practices are established and applied
66PR.PS-02Software is maintained, replaced, and removed commensurate with risk
67PR.PS-03Hardware is maintained, replaced, and removed commensurate with risk
68PR.PS-04Log records are generated and made available for continuous monitoring
69PR.PS-05Installation and execution of unauthorized software are prevented
70PR.PS-06Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle
Technology Infrastructure Resilience (PR.IR)Security architectures are managed with the organization’s risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience
71PR.IR-01Networks and environments are protected from unauthorized logical access and usage
72PR.IR-01Networks and environments are protected from unauthorized logical access and usage
73PR.IR-02The organization’s technology assets are protected from environmental threats
74PR.IR-03Mechanisms are implemented to achieve resilience requirements in normal and adverse situations
75PR.IR-04Adequate resource capacity to ensure availability is maintained
DETECT (DE)Possible cybersecurity attacks and compromises are found and analyzed
Continuous Monitoring (DE.CM)Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events
76DE.CM-01Networks and network services are monitored to find potentially adverse events
77DE.CM-02The physical environment is monitored to find potentially adverse events
78DE.CM-03Personnel activity and technology usage are monitored to find potentially adverse events
79DE.CM-06External service provider activities and services are monitored to find potentially adverse events
80DE.CM-09Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Adverse Event Analysis (DE.AE)Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents
81DE.AE-02Potentially adverse events are analyzed to better understand associated activities
82DE.AE-03Information is correlated from multiple sources
83DE.AE-04The estimated impact and scope of adverse events are understood
84DE.AE-06Information on adverse events is provided to authorized staff and tools
85DE.CM-03Cyber threat intelligence and other contextual information are integrated into the analysis
86DE.AE-08Incidents are declared when adverse events meet the defined incident criteria
RESPOND (RS)Actions regarding a detected cybersecurity incident are taken
Incident Management (RS.MA)Responses to detected cybersecurity incidents are managed
87RS.MA-01The incident response plan is executed in coordination with relevant third parties once an incident is declared
88RS.MA-02Incident reports are triaged and validated
89RS.MA-03Incidents are categorized and prioritized
90RS.MA-04Incidents are escalated or elevated as needed
91RS.MA-05The criteria for initiating incident recovery are applied
Incident Analysis (RS.AN)Investigations are conducted to ensure effective response and support forensics and recovery activities
92RS.AN-03Analysis is performed to establish what has taken place during an incident and the root cause of the incident
93RS.AN-06Actions performed during an investigation are recorded, and the records’ integrity and provenance are preserved
94RS.AN-07Incident data and metadata are collected, and their integrity and provenance are preserved
95RS.AN-08An incident’s magnitude is estimated and validated
Incident Response Reporting and Communication (RS.CO)Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies
96RS.CO-02Internal and external stakeholders are notified of incidents
97RS.CO-03Information is shared with designated internal and external stakeholders
Incident Mitigation (RS.MI)Activities are performed to prevent expansion of an event and mitigate its effects
98RS.MI-01Incidents are contained
99RS.MI-02Incidents are eradicated
RECOVER (RC)Assets and operations affected by a cybersecurity incident are restored
Incident Recovery Plan Execution (RC.RP)Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents
100RC.RP-01The recovery portion of the incident response plan is executed once initiated from the incident response process
101RC.RP-02Recovery actions are selected, scoped, prioritized, and performed
102RC.RP-03The integrity of backups and other restoration assets is verified before using them for restoration
103RC.RP-04Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms
104RC.RP-05The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed
105RC.RP-06The end of incident recovery is declared based on criteria, and incident-related documentation is completed
Incident Recovery Communication (RC.CO)Restoration activities are coordinated with internal and external parties
106RC.CO-03Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders
107RC.RP-02Public updates on incident recovery are shared using approved methods and messaging

The NIST CSF 2.0 Coverage Automated by SanerNow

SL.NONIST 2.0 ControlsSub-category
GOVERN (GV)The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
Asset Management (ID.AM)Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization’s risk strategy
1ID.AM-01Inventories of hardware managed by the organization are maintained
2ID.AM-02Inventories of software, services, and systems managed by the organization are maintained
3ID.AM-05Assets are prioritized based on classification, criticality, resources, and impact on the mission
4ID.AM-08Systems, hardware, software, services, and data are managed throughout their life cycles
Risk Assessment (ID.RA)The cybersecurity risk to the organization, assets, and individuals is understood by the organization
5ID.RA-01Vulnerabilities in assets are identified, validated, and recorded
6ID.RA-02Cyber threat intelligence is received from information sharing forums and sources
7ID.RA-03Internal and external threats to the organization are identified and recorded
8ID.RA-04Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
9ID.RA-05Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
10ID.RA-06Risk responses are chosen, prioritized, planned, tracked, and communicated
11ID.RA-07Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
12ID.RA-08Processes for receiving, analyzing, and responding to vulnerability disclosures are established
13ID.RA-02Cyber threat intelligence is received from information sharing forums and sources
PROTECT (PR)Safeguards to manage the organization’s cybersecurity risks are used
Platform Security (PR.PS)The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization’s risk strategy to protect their confidentiality, integrity, and availability
14PR.PS-01Configuration management practices are established and applied
15PR.PS-02Software is maintained, replaced, and removed commensurate with risk
16PR.PS-03Hardware is maintained, replaced, and removed commensurate with risk
17PR.PS-04Log records are generated and made available for continuous monitoring
18PR.PS-05Installation and execution of unauthorized software are prevented
DETECT (DE)Possible cybersecurity attacks and compromises are found and analyzed
RESPOND (RS)Actions regarding a detected cybersecurity incident are taken
RECOVER (RC)Assets and operations affected by a cybersecurity incident are restored
SecPod | Prevent Cyberattacks