Valtik Studios
Back to blog
NIST CSF 2.0highUpdated 2026-04-1725 min

NIST Cybersecurity Framework 2.0: The Complete Implementation Guide

Every vendor questionnaire asks about NIST CSF alignment. Most companies answer yes without actually aligning. CSF 2.0 shipped February 2024 with a new Govern function. This is the complete implementation guide. Six functions in detail. Implementation Tiers. Profiles. The 12-month plan. Common mistakes. How CSF relates to SOC 2, ISO 27001, SP 800-53, PCI, HIPAA.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

The framework every US company gets asked about

Every vendor questionnaire, every cyber insurance application, every acquisition due diligence packet includes some version of the same question. "Do you align with NIST Cybersecurity Framework?" The expected answer is yes. The actual answer at most mid-market companies is "not really, but we can say we do."

NIST CSF 2.0 shipped in February 2024. It's the US government's flagship cybersecurity framework and the de facto baseline for non-regulated US private sector cybersecurity programs. It's voluntary in most cases. It becomes contractually required the moment you sell into federal, certain regulated industries, or to any customer who insists on the questionnaire.

This post is the complete NIST CSF 2.0 implementation guide. What the framework actually is. The six functions and what they require. How to conduct a CSF-aligned assessment. How to structure a program around it. Specific implementation patterns for mid-market companies. And what's different in 2.0 versus 1.1.

What NIST CSF is

NIST CSF is a framework, not a standard. It describes outcomes, not specific controls. Organizations pick controls that achieve those outcomes. That makes it flexible and makes it hard to measure compliance precisely.

CSF 2.0 structures cybersecurity around six functions:

  1. Govern (new in 2.0) — cybersecurity governance + risk management at the organizational level
  2. Identify — what assets, data, and risks exist
  3. Protect — controls preventing incidents
  4. Detect — capabilities to spot incidents
  5. Respond — handling active incidents
  6. Recover — restoring operations after incidents

Under each function are categories + subcategories describing specific outcomes.

CSF is designed to be:

  • Applicable to any industry
  • Applicable to any size organization
  • Aligned with other frameworks (maps to ISO 27001, SP 800-53, etc.)
  • Risk-based rather than checklist-based

What's new in 2.0

Key changes from CSF 1.1 (2018) to CSF 2.0 (2024):

Govern function added

The biggest change. Govern covers:

  • Organizational context
  • Risk management strategy
  • Roles, responsibilities, authorities
  • Policy
  • Oversight
  • Cybersecurity supply chain risk management (CSCM)

1.1 had these scattered across Identify and as an appendix. 2.0 elevates them to first-class function status.

Supply chain emphasis

Cybersecurity supply chain risk management is central in 2.0. Third-party risk, vendor assessment, product supply chain security all pulled into the main framework.

Small organization focus

2.0 acknowledges that small orgs need simpler implementation paths. Quick Start Guides per industry and size.

Implementation examples

2.0 publishes implementation examples showing what each subcategory looks like in practice. Previously implementation was "you figure it out from the subcategory description."

Measurement emphasis

2.0 adds language around measuring + improving. Implementation Tiers (1-4) describe maturity. Profiles describe current state vs. target state.

The six functions in depth

Govern (GV)

Organizational-level cybersecurity governance.

Key categories:

  • GV.OC (Organizational Context) — understand the business mission, legal/regulatory requirements, stakeholders
  • GV.RM (Risk Management Strategy) — establish + communicate cybersecurity risk tolerance
  • GV.RR (Roles, Responsibilities, Authorities) — clear cybersecurity accountabilities
  • GV.PO (Policy) — organizational cybersecurity policy stack
  • GV.OV (Oversight) — measurement, performance review, improvement
  • GV.SC (Cybersecurity Supply Chain Risk Management) — vendor + product supply chain risk

What it looks like in practice:

  • Written cybersecurity policy stack (15-25 policies)
  • CISO or equivalent with defined authority
  • Board-level cybersecurity reporting (for larger orgs)
  • Documented risk tolerance
  • Third-party risk management program

Identify (ID)

Asset, risk, and environmental understanding.

Key categories:

  • ID.AM (Asset Management) — inventory of hardware, software, data, services, personnel
  • ID.RA (Risk Assessment) — threat + vulnerability + likelihood + impact analysis
  • ID.IM (Improvement) — continuous improvement of identification activities

What it looks like:

  • Up-to-date asset inventory (CMDB or equivalent)
  • Data classification with location mapping
  • Third-party vendor inventory
  • Annual risk assessment with documented output
  • POA&M (plan of action and milestones) for identified gaps

Protect (PR)

Safeguards that reduce likelihood or impact.

Key categories:

  • PR.AA (Identity, Authentication, Access Control) — IAM, MFA, RBAC
  • PR.AT (Awareness + Training) — workforce security awareness
  • PR.DS (Data Security) — encryption, data classification handling
  • PR.PS (Platform Security) — secure configurations, patch management
  • PR.IR (Technology Infrastructure Resilience) — segmentation, redundancy

What it looks like:

  • MFA on all privileged access
  • Documented security awareness training with phishing sims
  • Encryption at rest + in transit
  • Hardened configurations (CIS benchmarks, STIGs)
  • Patch management program

Detect (DE)

Capabilities to spot incidents.

Key categories:

  • DE.CM (Continuous Monitoring) — network, assets, personnel, third-party monitoring
  • DE.AE (Adverse Event Analysis) — analyze potential events to determine if incidents

What it looks like:

  • SIEM with relevant log sources
  • EDR on every endpoint
  • Network traffic analysis
  • Alerting with SLA-driven response
  • Threat intelligence integration

Respond (RS)

Handling active incidents.

Key categories:

  • RS.MA (Incident Management) — incident response process
  • RS.AN (Incident Analysis) — forensic investigation
  • RS.CO (Incident Response Communication) — stakeholder communication
  • RS.MI (Incident Mitigation) — containment + eradication

What it looks like:

  • Written IR plan, tested annually
  • Documented incident classification + severity
  • Forensic retainer or internal capability
  • Communication templates + decision trees
  • Integration with insurance, legal, regulatory

Recover (RC)

Restoring operations.

Key categories:

  • RC.RP (Incident Recovery Plan Execution) — recovery procedures
  • RC.CO (Incident Recovery Communication) — stakeholder updates during recovery

What it looks like:

  • Documented recovery procedures
  • Tested backups (3-2-1-1-0 framework)
  • DR plan tested annually
  • Communication templates for recovery phase
  • Post-incident review + improvement integration

Implementation Tiers

CSF describes four maturity tiers:

  • Tier 1 (Partial) — ad hoc, reactive, limited awareness
  • Tier 2 (Risk Informed) — some risk management, not organization-wide
  • Tier 3 (Repeatable) — documented, consistent, organization-wide
  • Tier 4 (Adaptive) — continuous improvement, mature, leading-edge

Most mid-market US companies operate at Tier 1-2. Target for most compliance-driven programs: Tier 3.

Profiles

A CSF Profile describes current state + target state for each subcategory.

Current State Profile:

  • Where are we today on every subcategory?
  • Documented with evidence
  • Typically self-assessed, validated by external auditor periodically

Target State Profile:

  • Where do we need to be?
  • Based on risk tolerance + business requirements + regulatory drivers
  • Documented with rationale for each gap

Gap Analysis:

  • Current vs. target for each subcategory
  • Prioritized remediation roadmap
  • Budget + timeline

This is the core CSF work. Without profiles, CSF is descriptive language with no operational implication.

The 12-month CSF implementation plan

For a mid-market organization starting from scratch.

Months 1-3. Foundation + Assessment

  • Stakeholder alignment on CSF adoption
  • Current-state assessment against all six functions
  • Target-state profile development
  • Gap analysis + POA&M
  • Executive / board communication

Months 4-6. Governance + Identify

  • Cybersecurity policy stack written or refreshed
  • Risk assessment methodology defined
  • Asset inventory project
  • Vendor inventory + third-party risk program
  • Data classification

Months 7-9. Protect

  • MFA expansion if gaps exist
  • Training program launched
  • Patch management process formalized
  • Baseline configuration management
  • Data security controls (encryption, DLP as applicable)

Months 10-12. Detect + Respond + Recover

  • SIEM / EDR coverage gap remediation
  • IR plan + tabletop
  • DR plan + testing
  • Backup strategy validation
  • Continuous monitoring

Year 2. Improvement

  • Annual CSF reassessment
  • Refresh target state based on evolving threats
  • Raise maturity tier where beneficial
  • Maintain and improve

Industry-specific profiles

NIST publishes CSF Community Profiles for specific industries:

  • Manufacturing (NIST CSF Profile for Manufacturing)
  • Smart Grid (NISTIR 7628 + CSF profile)
  • Maritime (Maritime Transportation System CSF profile)
  • Healthcare (HHS 405(d) guidance aligned)
  • Small Business (NIST Small Business CSF Quick Start)

These profiles prioritize subcategories most relevant to the industry and include sector-specific implementation guidance.

CSF vs. other frameworks

How CSF relates to frameworks you've heard of:

CSF vs. NIST SP 800-53

SP 800-53 is a control catalog. CSF is an outcomes-based framework.

  • Federal agencies use SP 800-53 directly
  • Private sector maps CSF outcomes to 800-53 controls (CSF publishes an informative reference)

CSF vs. NIST SP 800-171

800-171 is the control baseline for Controlled Unclassified Information (CUI) handling. Required for DIB contractors subject to CMMC.

  • Not as broad as CSF (focused specifically on CUI protection)
  • More prescriptive than CSF

CSF vs. ISO 27001

ISO 27001 is a certifiable standard.

  • ISO 27001 focuses on ISMS (Information Security Management System)
  • CSF covers cybersecurity specifically
  • Many organizations use both (CSF for cybersecurity posture, ISO 27001 for certification)

CSF vs. SOC 2

SOC 2 is an attestation framework with specific Trust Services Criteria.

  • SOC 2 is what US enterprise customers require
  • CSF is the program framework underneath
  • Many companies implement CSF to structure their security program, then pursue SOC 2 for customer-facing attestation

CSF vs. PCI DSS

PCI DSS is prescriptive.

  • PCI DSS is required for any card-data handler
  • CSF is voluntary, broader
  • Both can coexist; PCI DSS controls map to specific CSF subcategories

CSF vs. HIPAA Security Rule

HIPAA is US federal law for healthcare.

  • HIPAA has specific required safeguards
  • CSF is voluntary framework
  • HHS publishes 405(d) guidance mapping CSF to HIPAA

Common implementation mistakes

From engagements we've run with CSF-aligned programs:

  1. CSF-aligned on paper, not in operations. Every subcategory marked "implemented" but evidence is thin. Breaks on audit.
  2. No target state. Current state assessed but no clarity on where the program should get to.
  3. Skip Govern. Organizations focus on Protect/Detect/Respond and treat Govern as philosophy. The Govern function matters most for program maturity.
  4. Conflate CSF with compliance. CSF is not a compliance framework. PCI/HIPAA/SOC 2 compliance work is adjacent.
  5. Annual assessment but no operational integration. Assessment happens, report filed, no improvement loop.
  6. Tier claims without evidence. "We're Tier 3" without documented practices supporting the claim.
  7. No business risk integration. CSF subcategories addressed without reference to what matters to the business.

Using CSF with the Board

CSF makes excellent board-level reporting content:

  • Current tier by function (visualizes program maturity)
  • Trend over time (are we improving?)
  • Target state vs. current state (what gaps need investment?)
  • Industry benchmarking (where are peers?)

Board doesn't need to understand every subcategory. They need to see the shape of the program, know where management is investing, and validate the trajectory.

Working with us

We run CSF-aligned assessments and implementation engagements. Our typical work:

  • Current-state assessment against all six functions
  • Target-state profile development aligned to business risk
  • Gap analysis + prioritized POA&M
  • Implementation advisory through the 12-month program
  • Integration with specific compliance frameworks (SOC 2, HIPAA, PCI)
  • Board-level reporting framework

For companies pursuing SOC 2 / ISO 27001 / CMMC, CSF provides the underlying program structure that the compliance frameworks formalize for attestation.

Valtik Studios, valtikstudios.com.

nist csfnist cybersecurity frameworkcsf 2.0govern functioncybersecurity governanceframework implementationcomplete guide

Want us to check your NIST CSF 2.0 setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.