National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
NIST CSF is a key tool for organizations looking to bolster their cybersecurity posture

Editor’s note: this piece on the NIST cybersecurity framework was originally published in February 2020 and has been updated in May 2024 with new information.

Data breaches and developing cyber threats are routinely making headlines, and cybersecurity has become a top concern for organizations of all sizes and industries. Cyberattacks have become more frequent, sophisticated, and damaging than ever before, making it critical for organizations to develop a strong culture of cybersecurity to protect their assets and maintain trust with their customers.

However, building a culture of cybersecurity can be a complex and challenging task, especially for organizations that need more knowledge and resources or for those that have diverse or misaligned teams. This is where the NIST Cybersecurity Framework can be an invaluable tool for organizations looking to improve their security posture and more efficiently manage risk and compliance. 

In this article, we’ll discuss implementing the NIST Cybersecurity Framework — a tool security leaders can use to foster a definitive, organization-wide understanding of what an organization’s governance considers an acceptable level of risk. Related: Guide to NIST 800-53

How does the NIST Cybersecurity Framework (CSF) support a culture of cybersecurity?

NIST CSF helps organizations bolster their cybersecurity posture
NIST CSF enables organizations to have enterprise-wide conversations about cybersecurity

It is not unusual for an organization to have a disconnect between the C-suite and the technical implementation staff regarding risk tolerance. To make things worse, the organization is often unaware it has this problem. Unless the entire organization is aligned concerning its risk tolerance level, it’s difficult for security executives to secure budgets that are realistic to the risk associated with the company’s size, industry, or business model. 

However, with a definitive, universal understanding of what an organization’s governance considers an acceptable level of risk in place, it becomes simple for security leaders — like you — to acquire the resources needed to improve cyber resilience.

Whether you work for a three-year-old company or a hundred-year-old company, the NIST Cybersecurity Framework is a tool you can leverage to assess enterprise-wide risks and foster internal dialogues to align your whole organization on its risk tolerance objectives. This, in turn, will help your team set better security priorities and secure the budget needed to mitigate IT risks adequately. 

What is NIST CSF? 

The 6 pillars of NIST CSF are govern, identify, protect, detect, respond, and recover
NIST CSF is a set of best practices for cybersecurity and has 6 functions: govern, identify, protect, detect, respond, and recover

The NIST Cybersecurity Framework (CSF) provides a common language and methodology for managing cybersecurity risk and helps guide key decisions about risk management activities through the various levels of an organization, from senior executives to business and process level and implementation teams as well. NIST standards are based on best practices from several security documents, organizations, and publications (e.g., ISO 27001, COBIT 5, etc.). 

Because the Framework is designed to be outcome-driven (as opposed to prescriptive), it works for organizations of all sizes, industries, and maturities. Thus, whether you’re just starting to establish a cybersecurity program or already running a mature program, the Framework can provide value by acting as a top-level security management tool that helps assess cybersecurity risk across the organization.   

Are you tired of losing efficiency in implementing and assembling your company’s compliance and risk management solutions? Hyperproof is a great place to start reducing your workload.

3 key components to understand before implementing the NIST Cybersecurity Framework 

Understanding NIST CSF implementation tiers, framework core, and profiles
Understanding the three major components of NIST CSF – implementation tiers, framework core, and framework profiles

The NIST Cybersecurity Framework is made of three major components: 

  1. Implementation Tiers
  2. Framework Core 
  3. Profiles 

1. Implementation tiers 

The NIST Framework also consists of four implementation tiers that describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework. The tiers range from Partial (Tier 1) to Adaptative (4) and describe an increasing degree of rigor and how well-integrated cybersecurity risk decisions are into broader risk decisions, and the degree to which the organization shares and receives cybersecurity info from external parties.   

There are 4 implementation tiers for NIST CSF. Tier 1 partial, tier 2 risk informed, tier 3 repeatable, tier 4 adaptive

2. Framework core

 Within the NIST CSF, a Framework Core is a set of cybersecurity activities and references that is common across critical infrastructure sectors and organized around particular outcomes. The Framework Core comprises four types of elements: Functions, Categories, Subcategories, and Informative References.

Functions: One of the main components of the Framework, Functions provide the highest level of structure for organizing basic cybersecurity activities into Categories and Subcategories. The six Functions are Govern, Identify, Protect, Detect, Respond, and Recover.

Categories: The subdivisions of a Function into general groups of cybersecurity outcomes closely tied to programmatic needs and particular activities. Examples of Categories include Asset Management, Access Control, and Detection Processes.

The five functions break out into 23 Categories which contain specific outcome driven statements that provide consideration for cr eating or improving a cybersecurity program.

Subcategories: The subdivision of a Category into specific outcomes of technical and management activities. Think of subcategories as outcome-driven statements that provide considerations for creating or improving a cybersecurity program. 

Examples of Subcategories include:

  1. External information systems are cataloged
  2. Data-at-rest is protected
  3. Notifications from detection systems are investigated

3. Framework profiles 

Profiles are an organization’s unique alignment of its firm’s requirements and objectives, risk appetite, and resources against the desired outcomes of the Framework Core. Profiles can be used to identify opportunities for improving cybersecurity posture by comparing a current profile (the “as is” state) with a target profile (the “to be” state).

There isn’t a right or wrong way to approach the profiles. But one way to approach it is to map your organization’s cybersecurity requirements, mission objectives, operating methodologies, and current practices against the subcategories of the Framework Core to create a Current-State Profile. 

Mapping your organization's cybersecurity requirements to the NIST CSF framework core

In addition to these components, NIST has also provided a framework for clarifying the communication roles for each level within an organization. 

Communication flows required for implementing NIST CSF

Source: NIST.gov

Executive-level responsibilities: This level communicates the mission priorities, available resources, and overall risk tolerance to the business/process level. 

The business/process level responsibilities: This level uses the information as inputs into the risk management process and then formulates a profile to coordinate implementation/operation activities. 

The implementation/operations level responsibilities: This level communicates the Profile implementation progress to the business/process level. The business/process level uses this information to perform an impact assessment. Business/process level management reports the outcomes of that impact assessment to the executive level to inform the organization’s overall risk management process and to the implementation/operations level for awareness of business impact.”

Related: What is the Cybersecurity Maturity Model Certification (CMMC)?

Download our Ebook, “The 2023 Proposed Changes to NIST CSF,” to learn about the changes coming to the NIST CSF and how your organization can prepare for a seamless transition into compliance.

A breakdown of the 6 risk management framework (RMF) steps

The 6 risk management framework steps
Learn the six risk management frameworks steps recommended by NIST

As we’ve seen and discussed, the NIST Framework for managing cybersecurity risks through the various levels of an organization is quite complex and full of various levels and steps. This section will cover the 6 RMF steps identified by the NIST to manage cybersecurity risks effectively.

1. Identify information systems

The first step in the process involves identifying and categorizing the different types of systems within the organization. Everything must be accounted for, including information types, information systems, and assets, in addition to the specific responsibilities and roles of the individuals who manage them. Finally, you’ll also want to log what each system’s intended use is and how each system connects to others.

2. Select specific security controls

The next step in the process is to select which security controls you’d like implemented and used as technical safeguards for your identified systems. These critical controls will protect your systems’ integrity, confidentiality, and information. These controls must be selected on the basis that they are effective in their application.

3. Implementing selected security controls

In this step in the process, the selected security controls from step two are implemented into their respective systems. Additionally, it must be described how each control is employed in its specific system of operation. These controls will be used to both posture and benchmark the success of your organization’s cybersecurity initiatives. Additionally, implemented policies should be tailored to the individual devices they’re aligned with and include the proper security documentation.

4. Assessment of implemented security controls

This step is used to benchmark the relative success of the security controls that you have in place. Thus, your security’s effectiveness is only as good as its ability to protect against threats effectively. Controls must be appropriately implemented to produce the desired outcome of the security procedures for specific devices and systems.

5. Authorization of information systems

Nearing the end of our six-step ‘cycle,’ this step requires reporting system control operational success and determining whether present risks are permissible to the organization. This step also involves the tracking of failed controls put in place. That said, organization stakeholders must grant permission for this step to occur to ensure that all organizational personnel are kept informed.

6. Monitoring security controls

The final step in fully implementing your cybersecurity management system is to continually monitor and update your systems. Thus, your system will reflect the dynamic and continuously evolving technologies and threats at any given time. Automated tools can help to increase the efficiency and effectiveness of your security systems and processes.

How the NIST cybersecurity framework can be applied  

Applying NIST CSF at your organization
Applying NIST CSF at your organization

Several organizations have leveraged the Framework to create a risk heat map for their critical business function, driving organization-wide alignment on risk tolerance and prioritization. Below is the story of how Intel has utilized the Framework to achieve meaningful outcomes.  

Proof positive: Intel case study 

Intell used the Framework to create a risk heat map that can be used to set risk tolerance baselines, identify areas that need more detailed or technical assessments, identify areas of underinvestment and overinvestment, and assist in risk prioritization. 

Intel divided its computer infrastructure into five critical business functions and piloted the Framework to perform an initial high-level risk assessment for one business function. They conducted the project in four phases: 

  1. Set target scores: A core group of security SMEs set target scores, validated Categories, developed Subcategories, and performed an initial risk assessment and scoring. This phase helped the team validate that their approach could be a meaningful tool for prioritization and risk tolerance decisions. 
  2. Assess current status: Separate from the core group, several individual security SMEs conducted an independent risk assessment based on the Framework. They individually scored the Categories and noted specific Subcategories where opportunities to improve existed. 
  3. Analyze results: They used the heat map format to examine areas of concern at the subcategory level and further identify specific areas in need of improvement.
  4. Communicate results: They reviewed their findings and recommendations with Intel’s CISO and staff. This process fostered dialogue and helped the broader team agree on risk tolerance and prioritization.  
Risk assessment for implementing NIST CSF

This process brought the organization several benefits. One of the most valuable was the internal dialogues it helped foster — risk conversations became grounded in a shared understanding of the threats, vulnerabilities, and impacts the organization faces, and the organization gained improved visibility into its strengths and opportunities to improve. All of this helps the organization set better security priorities and better deploy budgets and security solutions. Best of all, all of these results were achieved at a cost of under 175 FTE (full-time-employee) hours. 

How to start putting the framework into practice

NIST CSF implementation checklist
How to tailor NIST CSF to best meet the needs of your organization

Suppose you’re interested in improving how your organization identifies, detects, responds to, and recovers from cyber risk. In that case, the NIST Cybersecurity Framework is a solid tool to incorporate into your risk management practices. To maximize the benefits to your organization, you’ll need to tailor the Framework to meet your specific business processes and priorities, start where you’re comfortable, and commit to iterations with decision-makers throughout the process.

Lastly, it’s worth remembering that cyber risk management is not an end result, but an ongoing process of iteration and dialogue about risk.

If you’re interested in improving the culture around cybersecurity at your organization, sign up for a personalized demo with Hyperproof to see how we can support you throughout your entire compliance journey.  

Next steps: Implementing NIST CSF with Hyperproof

Hyperproof makes implementing NIST CSF easy
Hyperproof helps make implementing NIST CSF easy

The NIST CSF database represents the list of security controls and standards for federal agencies to architect and manage their information security systems. NIST established these guidelines to provide guidance for protecting agencies’ and citizens’ private data. While federal agencies are required to follow these standards, other organizations should follow the same guidelines.

Hyperproof’s compliance operations software can help organizations implement NIST CSF guidelines, support ongoing control evaluation efforts, and improve the security of the organization’s information systems. Hyperproof makes complying with NIST guidelines easier by providing:

  • A starter template with NIST CSF security controls.
  • Tools to help you quickly collect evidence to verify the efficacy of various controls.
  • A single pane of glass is included in all of your compliance efforts.
  • The ability to leverage NIST CSF controls to comply with other cybersecurity and data privacy standards; the ability to map a control to multiple standards.
  • A way to see your progress towards compliance, assign tasks, and prioritize work streams.

Get ahead with NIST CSF 2.0

As both cybersecurity threats and the frameworks created to help mitigate them continue to evolve, businesses must keep their security practices up to date. An important aspect of this will be navigating the upcoming changes to the NIST Cybersecurity Framework. 

Want to learn more about how Hyperproof can stay NIST CSF compliant? Request your demo today.

Monthly Newsletter

Get the Latest on Compliance Operations.
Subscribe to Hyperproof Newsletter