πŸ“Œ NIST Cybersecurity Framework (CSF) β€” Quick Reference

Core Concept

A flexible, risk-based framework developed by NIST to help organizations manage and reduce cybersecurity risks across sectors.


🧩 Framework Core: 5 Key Functions

These are interdependent categories of cybersecurity activities:

flowchart LR
    ID[Identify]
    PR[Protect]
    DE[Detect]
    RS[Respond]
    RC[Recover]
    ID --> PR --> DE --> RS --> RC

πŸ” NIST CSF Functions Overview

FunctionDescriptionCategories
πŸ” IdentifyUnderstand your organizational environment to manage cybersecurity risks.Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, Supply Chain Risk Management
πŸ›‘οΈ ProtectImplement safeguards to limit the impact of potential events.Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, Protective Technology
🚨 DetectIdentify the occurrence of a cybersecurity event.Anomalies and Events, Security Continuous Monitoring, Detection Processes
πŸš’ RespondTake action regarding a detected incident.Response Planning, Communications, Analysis, Mitigation, Improvements
πŸ” RecoverRestore capabilities or services after a cyber event.Recovery Planning, Improvements, Communications

🧭 Framework Tiers

Reflects maturity of risk management processes:

TierDescription
1Partial
2Risk Informed
3Repeatable
4Adaptive

🎯 Framework Profile

Tailored implementation aligned with:

  • Business needs
  • Risk tolerance
  • Resources

Used for gap analysis between current and target cybersecurity posture.

Helpful Tip

πŸ”„ Align existing policies and tools (e.g., SIEMs, firewalls, training programs) to the CSF’s core functions to identify gaps and prioritize actions.



NIST Cybersecurity Framework Core

The NIST Cybersecurity Framework (CSF) is structured into five core Functions, which are further divided into Categories and Subcategories, supported by Informative References.

Core Functions:

  • Identify (ID)
  • Protect (PR)
  • Detect (DE)
  • Respond (RS)
  • Recover (RC)

Each function represents a high-level cybersecurity outcome and helps organize cybersecurity activities at a strategic level.

Note

Each Function is supported by Categories and Subcategories, which describe specific outcomes and security activities.


Framework Implementation Tiers

Implementation Tiers describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework.

Key Points:

  • Tiers range from Partial (Tier 1) to Adaptive (Tier 4).
  • They do not represent maturity levels.
  • They reflect risk management process integration, threat awareness, and cybersecurity culture.

Tip

Choose a Tier based on risk appetite, regulatory requirements, and implementation feasibility.

Considerations for Tier Selection:

  • Risk management processes
  • Threat and vulnerability awareness
  • Business and security alignment
  • Legal and governance requirements

Framework Profiles

Profiles align the Framework Core with business requirements, risk tolerance, and resources.

Types:

  • Current Profile: The β€œas-is” state of cybersecurity posture.
  • Target Profile: The β€œto-be” state aligned with business goals.

Uses:

  • Identify gaps between Current and Target Profiles
  • Prioritize improvements
  • Develop a cybersecurity roadmap

Example

Comparing Profiles can reveal specific areas for improvement in asset management, detection capabilities, or incident response readiness.


How to Use Framework Profiles: Example

Subcategories are mapped to measurable objectives:

FunctionCategorySubcategoryCurrentTargetCostPriority
IdentifyAMID.AM-248LowMedium
ProtectDSPR.DS-277ModerateMedium
DetectAEDE.AE-468HighHigh
RespondANRS.AN-457ModerateMedium
RecoverRPRC.RP-168ModerateMedium

Warning

Not all subcategories may apply to every organization. Customize Profiles to fit organizational needs.

Scoring ranges from 0 to 10, with associated cost and implementation priority to guide planning.


Using the Framework: Asset Management Example

Consider the Asset Management category within the Identify (ID) function:

  • Category ID: ID.AM
  • Focus areas:
    • Physical devices and systems
    • Software platforms and applications
    • Communication and data flows
    • External information systems

Each subcategory defines increasingly specific and actionable security outcomes.

Note

Use this approach to develop specific action items within each Function and evaluate organizational readiness.


Penguinified by https://chatgpt.com/g/g-683f4d44a4b881919df0a7714238daae-penguinify