0% found this document useful (0 votes)
115 views9 pages

CSF 20

The NIST Cybersecurity Framework (CSF) 2.0 Reference Tool provides a downloadable export of the draft CSF 2.0 Core. The export displays the Functions, Categories, and Subcategories that make up the CSF, along with implementation examples for each subcategory. The CSF is a voluntary framework for managing cybersecurity risk that was created through collaboration between industry and government.

Uploaded by

Rafan Ken
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views9 pages

CSF 20

The NIST Cybersecurity Framework (CSF) 2.0 Reference Tool provides a downloadable export of the draft CSF 2.0 Core. The export displays the Functions, Categories, and Subcategories that make up the CSF, along with implementation examples for each subcategory. The CSF is a voluntary framework for managing cybersecurity risk that was created through collaboration between industry and government.

Uploaded by

Rafan Ken
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

NIST Cybersecurity Framework

Title (CSF) Draft:


Public 2.0 Reference Tool
The NIST Cybersecurity
Read Me Framework
This (CSF) 2.0
is a download from the CSF 2.0 Reference Tool, which assists users in exploring the draft CSF 2.0 Core. This export is a user generated version of the C
Change Log Initial draft – not final
Public Draft: The NIST Cybersecurity Framework 2.0 www.nist.gov/cyberframework

Function Category Subcategory Implementation Examples


GOVERN (GV): Establish
and monitor the Organizational Context
(GV.OC): The circumstances - GV.OC-01: The organizational 1st: 1st Party Risk
mission
GV.OC-02:is understood
Internal andand informs
external Ex1: Share
1st: 1st theRisk
Party organization's
stakeholders
GV.OC-03: Legal,are determined, and
regulatory, and 3rd: 3rdParty
1st: 1st PartyRisk
Risk
contractual requirements
GV.OC-04: Critical regarding
objectives, 3rd: 3rdParty
1st: 1st PartyRisk
Risk
capabilities, and services
GV.OC-05: Outcomes, that
capabilities, 3rd:
Ex1: 3rd Party
Create anRisk
inventory of the
Risk Management Strategy and services that the organization organization's dependencies on
(GV.RM): The organization's GV.RM-01: Risk management 1st: 1st Party Risk
objectives
GV.RM-02:are Riskestablished andrisk
appetite and Ex1: Update
1st: 1st Partynear-term
Risk and
tolerance
GV.RM-03:statements
Enterpriseare
risk 3rd: 3rdParty
1st: 1st PartyRisk
Risk
management processes
GV.RM-04: Strategic includethat
direction Ex1: Aggregate and manage
1st: 1st Party Risk
describes
GV.RM-05:appropriate risk response
Lines of communication Ex1: Specify
1st: 1st Partycriteria
Risk for
across
GV.RM-06:the organization
A standardizedare method 3rd: 3rdParty
1st: 1st PartyRisk
Risk
for calculating,
GV.RM-07: documenting,
Strategic opportunities Ex1: Establish
1st: 1st criteria for using
Party Risk
Cybersecurity Supply Chain (i.e., positive risks) are identified Ex1: Define and communicate
Risk Management (GV.SC): GV.SC-01: A cybersecurity supply Ex1: Establish a strategy that
chain risk management
GV.SC-02: Cybersecurityprogram,
roles and expresses theone
Ex1: Identify objectives
or moreof the
responsibilities for suppliers,
GV.SC-03: Cybersecurity supply specific roles areas
Ex1: Identify or positions that
of alignment
chain risk management
GV.SC-04: Suppliers are is integrated
known and and overlap with cybersecurity
Ex1: Develop criteria for
prioritized by criticality
GV.SC-05: Requirements to address supplier criticality
Ex1: Establish based on, for
security
cybersecurity risks inand
GV.SC-06: Planning supply
due chains requirements for suppliers,
Ex1: Perform thorough due
diligence
GV.SC-07:areTheperformed
risks posed toby
reduce
a diligence on prospective
Ex1: Adjust assessment formats
supplier, their products and
GV.SC-08: Relevant suppliers and and
Ex1:frequencies
Define and usebased onand
rules the
other thirdSupply
GV.SC-09: partieschain
are included
security in protocols forand
Ex1: Policies reporting incident
procedures
practices
GV.SC-10:are integrated into
Cybersecurity supply require provenance
Ex1: Establish records
processes for for
Roles, Responsibilities, and chain risk management plans terminating critical
Authorities (GV.RR):
CSF 2.0 Page 2 of 9
Function Category Subcategory Implementation Examples
GV.RR-01: Organizational leadership 1st: 1st Party Risk
is responsible
GV.RR-02: andresponsibilities,
Roles, accountable for Ex1: Leaders
1st: 1st Party(e.g.,
Risk directors)
and authorities
GV.RR-03: related
Adequate to
resources are Ex1: Document
1st: 1st risk
Party Risk
allocated commensurate with
GV.RR-04: Cybersecurity is included 3rd: 3rdParty
1st: 1st PartyRisk
Risk
Policies, Processes, and in human resources practices Ex1: Integrate cybersecurity
Procedures (GV.PO): GV.PO-01: Policies, processes, and 1st: 1st Party Risk
procedures for managing
GV.PO-02: Policies, processes, and Ex1: Create,
1st: 1st Partydisseminate,
Risk and
Oversight (GV.OV): Results of procedures for managing Ex1: Update policies based on
organization-wide GV.OV-01: Cybersecurity risk 1st: 1st Party Risk
management
GV.OV-02: Thestrategy outcomes
cybersecurity riskare Ex1: Measure
1st: 1st how well the risk
Party Risk
management strategy is reviewed
GV.OV-03: Organizational Ex1: Review
1st: 1st Partyaudit
Risk findings to
GOVERN (GV) cybersecurity risk management Ex1: Review key performance
IDENTIFY (ID): Help
determine the current Asset Management (ID.AM):
Assets (e.g., data, hardware ID.AM-01: Inventories of hardware 1st: 1st Party Risk
managed
ID.AM-02:by the organization
Inventories are
of software, Ex1: Maintain
1st: 1st inventories for
Party Risk
services,
ID.AM-03: and systems managed
Representations by
of the Ex1: Maintain
1st: 1st inventories for
Party Risk
organization's authorized network
ID.AM-04: Inventories of services 3rd:
Ex1: InventoryRisk
3rd Party all external
provided
ID.AM-05:byAssets
suppliers are
are prioritized services
1st: 1st Party Riskthe
used by
based on classification,
ID.AM-06: Dropped (movedcriticality,
to Ex1: Define criteria for
GV.RR-02, GV.SC-02)
ID.AM-07: Inventories of data and 1st: 1st Party Risk
corresponding metadata
ID.AM-08: Systems, for
hardware, Ex1: Maintain
1st: 1st a list of the
Party Risk
Business Environment (ID.BE): software, and services are managed 3rd: 3rd Party Risk
Dropped (moved to GV.OC) ID.BE-01: Dropped (moved to
GV.OC-05)
ID.BE-02: Dropped (moved to
GV.OC-01)
ID.BE-03: Dropped (moved to
GV.OC-01)
ID.BE-04: Dropped (moved to
GV.OC-04, GV.OC-05)
ID.BE-05: Dropped (moved to
Governance (ID.GV): Dropped GV.OC-04)
(moved to GV) ID.GV-01: Dropped (moved to
GV.PO)
ID.GV-02: Dropped (moved to
GV.RR-02)
ID.GV-03: Dropped (moved to
GV.OC-03)
ID.GV-04: Dropped (moved to
GV.RM-03)
CSF 2.0 Page 3 of 9
Function Category Subcategory Implementation Examples
Risk Assessment (ID.RA): The
organization understands the ID.RA-01: Vulnerabilities in assets 1st: 1st Party Risk
are identified,
ID.RA-02: Cybervalidated, and
threat intelligence Ex1: UseParty
1st: 1st vulnerability
Risk
is receivedInternal
ID.RA-03: from information
and externalsharing Ex1: Configure cybersecurity
1st: 1st Party Risk
threats
ID.RA-04:to Potential
the organization
impactsareand 3rd: 3rdParty
1st: 1st PartyRisk
Risk
likelihoods of threats exploiting
ID.RA-05: Threats, vulnerabilities, Ex1: Business leaders
1st: 1st Party Risk and
likelihoods,
ID.RA-06: Riskandresponses
impacts are
areused to
chosen Ex1: Develop
1st: 1st Party threat
Risk models to
from the available
ID.RA-07: Changes options,
and exceptions Ex1:
Ex1: Apply the vulnerability
Implement and follow
are
ID.RA-08: Processes for for
managed, assessed risk
receiving, procedures
1st: 1st Party Risk formal
for the
analyzing, and responding
ID.RA-09: The authenticity andto 3rd:
Ex1: 3rd Party
Assess theRisk
authenticity
Risk Management Strategy integrity of hardware and software and cybersecurity of critical
(ID.RM): Dropped (moved to ID.RM-01: Dropped (moved to
GV.RM-01)
ID.RM-02: Dropped (moved to
GV.RM-02)
ID.RM-03: Dropped (moved to
Supply Chain Risk GV.RM-02)
Management (ID.SC): Dropped ID.SC-01: Dropped (moved to
GV.SC-01)
ID.SC-02: Dropped (moved to
GV.SC-03, GV.SC-07)
ID.SC-03: Dropped (moved to
GV.SC-05)
ID.SC-04: Dropped (moved to
GV.SC-07)
ID.SC-05: Dropped (moved to
Improvement (ID.IM): GV.SC-08, ID.IM-02)
Improvements to ID.IM-01: Continuous evaluation is 1st: 1st Party Risk
applied toSecurity
ID.IM-02: identify tests
improvements
and Ex1: Perform
1st: 1st Party self-assessments
Risk
exercises,
ID.IM-03: Lessons learneddone
including those duringin 3rd: 3rd Party Risk
1st: 1st Party Risk
execution of operationalplans
ID.IM-04: Cybersecurity processes,
that Ex1: Conduct
1st: 1st collaborative
Party Risk
IDENTIFY (ID) affect operations are Ex1: Establish contingency
PROTECT (PR): Use
safeguards to prevent or Identity Management,
Authentication, and Access PR.AA-01: Identities and credentials 1st: 1st Party Risk
for authorized
PR.AA-02: users,are
Identities services, and
proofed Ex1: Initiate
1st: 1st Partyrequests
Risk for new
and boundUsers,
PR.AA-03: to credentials
services,based
and on 3rd: 3rdParty
1st: 1st PartyRisk
Risk
hardware
PR.AA-04:are authenticated
Identity assertions are Ex1: Require
1st: 1st Partymultifactor
Risk
protected, conveyed, and verified
PR.AA-05: Access permissions, Ex1:
1st: 1st Party Risk assertions
Protect identity
entitlements, and authorizations are Ex1: Review logical and
CSF 2.0 Page 4 of 9
Function Category Subcategory Implementation Examples
PR.AA-06: Physical access to assets 1st: 1st Party Risk
Identity Management, is managed, monitored, and 3rd: 3rd Party Risk
Authentication and Access PR.AC-01: Dropped (moved to
PR.AA-01,
PR.AC-02: PR.AA-05)
Dropped (moved to
PR.AA-06)
PR.AC-03: Dropped (moved to
PR.AA-03,
PR.AC-04: PR.AA-05, PR.IR-01)
Dropped (moved to
PR.AA-05)
PR.AC-05: Dropped (moved to
PR.IR-01)
PR.AC-06: Dropped (moved to
PR.AA-02)
PR.AC-07: Dropped (moved to
Awareness and Training PR.AA-03)
(PR.AT): The organization's PR.AT-01: Users are provided 1st: 1st Party Risk
awareness and training
PR.AT-02: Individuals in so they
specialized Ex1: Provide
1st: 1st Partybasic
Risk
roles are provided
PR.AT-03: Droppedawareness
(moved toand 3rd: 3rd Party Risk
PR.AT-01, PR.AT-02)
PR.AT-04: Dropped (moved to
PR.AT-02)
PR.AT-05: Dropped (moved to
Data Security (PR.DS): Data is PR.AT-02)
managed consistent with the PR.DS-01: The confidentiality, 1st: 1st Party Risk
integrity,
PR.DS-02:and
Theavailability of data-at- Ex1:
confidentiality, UseParty
1st: 1st encryption,
Risk digital
integrity,
PR.DS-03:and availability
Dropped (moved of data-in-
to Ex1: Use encryption, digital
ID.AM-08)
PR.DS-04: Dropped (moved to PR.IR-
04)
PR.DS-05: Dropped (moved to
PR.DS-01,
PR.DS-06: PR-DS-02, PR.DS-10)
Dropped (moved to
PR.DS-01, DE.CM-09)
PR.DS-07: Dropped (moved to PR.IR-
01)
PR.DS-08: Dropped (moved to
ID.RA-09,
PR.DS-09:DE.CM-09)
Data is managed 1st: 1st Party Risk
throughout its confidentiality,
PR.DS-10: The life cycle, including 3rd: 3rdParty
1st: 1st PartyRisk
Risk
integrity,
PR.DS-11:and availability
Backups of dataofare
data-in- Ex1: Remove
1st: 1st Party data
Risk that must
Information Protection created, protected, maintained, and Ex1: Continuously back up
Processes and Procedures PR.IP-01: Dropped (moved to PR.PS-
01)
PR.IP-02: Dropped (moved to
ID.AM-08)
PR.IP-03: Dropped (moved to PR.PS-
01, ID.RA-07)
PR.IP-04: Dropped (moved to PR.DS-
11)
PR.IP-05: Dropped (moved to PR.IR-
02)
CSF 2.0 Page 5 of 9
Function Category Subcategory Implementation Examples
PR.IP-06: Dropped (moved to PR.DS-
09)
PR.IP-07: Dropped (moved to ID.IM-
03)
PR.IP-08: Dropped (moved to ID.IM-
03)
PR.IP-09: Dropped (moved to ID.IM-
04)
PR.IP-10: Dropped (moved to ID.IM-
02)
PR.IP-11: Dropped (moved to
GV.RR-04)
PR.IP-12: Dropped (moved to ID.RA-
Maintenance (PR.MA): 01, PR.PS-02)
Dropped (moved to ID.AM-08) PR.MA-01: Dropped (moved to
ID.AM-08,
PR.MA-02:PR.PS-03)
Dropped (moved to
Protective Technology (PR.PT): ID.AM-08, PR.PS-02)
Dropped (moved to other PR.PT-01: Dropped (moved to
PR.PS-04)
PR.PT-02: Dropped (moved to
PR.DS-01,
PR.PT-03: PR.PS-01)
Dropped (moved to
PR.PS-01)
PR.PT-04: Dropped (moved to
PR.AA-07, PR.IR-01)(moved to PR.IR-
PR.PT-05: Dropped
Platform Security (PR.PS): The 04)
hardware, software (e.g., PR.PS-01: Configuration 1st: 1st Party Risk
management
PR.PS-02: Software is maintained, Ex1:
practices are applied Establish,
1st: 1st test, deploy, and
Party Risk
replaced,
PR.PS-03: and removed
Hardware is maintained, Ex1: Perform
1st: 1st Party routine
Risk and
replaced,
PR.PS-04: and
Log removed
records are generated 3rd: 3rdParty
1st: 1st PartyRisk
Risk
and made available for continuous Ex1: Configure
PR.PS-05: Installation and execution 1st: 1st Party Risk all operating
of unauthorized
PR.PS-06: Securesoftware
softwareare Ex1: When
1st: 1st riskRisk
Party warrants it,
Technology Infrastructure development practices are Ex1: Protect all components of
Resilience (PR.IR): Security PR.IR-01: Networks and 1st: 1st Party Risk
environments are protected from 3rd:
PR.IR-02: The organization's 3rdParty
1st: 1st PartyRisk
Risk
technology assets are protected
PR.IR-03: Mechanisms are 3rd: 3rdParty
1st: 1st PartyRisk
Risk
implemented to achieve
PR.IR-04: Adequate resilience Ex1:
resource Ex1: Avoid
Monitorsingle
usage points of
of storage,
PROTECT (PR) capacity to ensure availability is power, compute, network
DETECT (DE): Find and
analyze possible Continuous Monitoring
(DE.CM): Assets are monitored DE.CM-01: Networks and network Ex1: Monitor DNS, BGP, and
services
DE.CM-02:areThe
monitored
physicalto find other networklogs
Ex1: Monitor services
from for
physical
environment is monitored to find access control systems (e.g.,
CSF 2.0 Page 6 of 9
Function Category Subcategory Implementation Examples
DE.CM-03: Personnel activity and Ex1: Use behavior analytics
technology usage are(moved
DE.CM-04: Dropped monitored
to to software to detect anomalous
DE.CM-01,
DE.CM-05: DE.CM-09)
Dropped (moved to
DE.CM-01, DE.CM-09)
DE.CM-06: External service provider Ex1: Monitor remote
activities
DE.CM-07: and services(moved
Dropped are monitored
to administration and
DE.CM-01, DE.CM-03, DE.CM-06,
DE.CM-08: Dropped (moved to
ID.RA-01)
DE.CM-09: Computing hardware Ex1: Monitor email, web, file
Adverse Event Analysis and software, runtime sharing, collaboration services,
(DE.AE): Anomalies, indicators DE.AE-01: Dropped (moved to
ID.AM-03)
DE.AE-02: Potentially adverse Ex1: Use security information
events
DE.AE-03: Information is correlated and
are analyzed to better Ex1:event management
Constantly transfer (SIEM)
log
from multiple sources data generated by other
DE.AE-04: The estimated impact and Ex1: Use SIEMs or other tools
scope of adverse
DE.AE-05: Droppedevents are to
(moved to estimate impact and scope,
DE.AE-08)
DE.AE-06: Information on adverse Ex1: Use cybersecurity
events is provided
DE.AE-07: to authorized
Cyber threat intelligence software to generate
Ex1: Securely provide alerts
cyber and
and other contextual
DE.AE-08: information
Incidents are declared threat intelligence
Ex1: Apply incidentfeeds to to
criteria
Detection Processes (DE.DP): when adverse events meet the known and assumed
Dropped (moved to other DE.DP-01: Dropped (moved to
GV.RR-02)
DE.DP-02: Dropped (moved to
DE.AE)
DE.DP-03: Dropped (moved to
ID.IM-02)
DE.DP-04: Dropped (moved to
DE.AE-06)
DE.DP-05: Dropped (moved to
DETECT (DE) ID.IM-03)
RESPOND (RS): Take
action regarding a Response Planning (RS.RP):
Dropped (moved to RS.MA) RS.RP-01: Dropped (moved to
Incident Management RS.MA-01)
(RS.MA): Responses to RS.MA-01: The incident response Ex1: Detection technologies
plan is executed
RS.MA-02: once
Incident an incident
reports are is automatically report confirmed
1st: 1st Party Risk
triaged and validated (formerly
RS.MA-03: Incidents are categorized Ex1:
1st: 1st Party Risk review
Preliminarily
and prioritized
RS.MA-04: (formerly
Incidents RS.AN-04,
are escalated Ex1: Further
1st: 1st Partyreview
Risk and
or elevatedThe
RS.MA-05: as needed
criteria(formerly
for initiating Ex1: Track
1st: 1st andRisk
Party validate the
Incident Analysis (RS.AN): incident recovery are applied Ex1: Apply incident recovery
Investigation is conducted to
CSF 2.0 Page 7 of 9
Function Category Subcategory Implementation Examples
RS.AN-01: Dropped (moved to
RS.MA-02)
RS.AN-02: Dropped (moved to
RS.MA-02, RS.MA-03,
RS.AN-03: Analysis RS.MA-04)to
is performed 1st: 1st Party Risk
determine what has(moved
RS.AN-04: Dropped taken place
to Ex1: Determine the sequence
RS.MA-03)
RS.AN-05: Dropped (moved to
ID.RA-08)
RS.AN-06: Actions performed during 1st: 1st Party Risk
an investigation
RS.AN-07: aredata
Incident recorded
and and Ex1: Require
1st: 1st Partyeach
Risk incident
metadata
RS.AN-08:areThecollected,
incident'sand their
magnitude Ex1: Collect,
1st: 1st Partypreserve,
Risk and
Incident Response Reporting is estimated and validated Ex1: Review other potential
and Communication (RS.CO): RS.CO-01: Dropped (moved to
PR.AT-01)
RS.CO-02: Internal and external 1st: 1st Party Risk
stakeholders are notified
RS.CO-03: Information of
is shared 3rd: 3rdParty
1st: 1st PartyRisk
Risk
with designated
RS.CO-04: internal
Dropped (moved andto 3rd: 3rd Party Risk
RS.MA-01, RS.MA-04)
RS.CO-05: Dropped (moved to
Incident Mitigation (RS.MI): RS.CO-03)
Activities are performed to RS.MI-01: Incidents are contained 1st: 1st Party Risk
RS.MI-02: Incidents are eradicated 3rd: 3rdParty
1st: 1st PartyRisk
Risk
RS.MI-03: Dropped (moved to 3rd: 3rd Party Risk
Improvements (RS.IM): ID.RA-06)
Dropped (moved to ID.IM) RS.IM-01: Dropped (moved to
ID.IM-03)
RS.IM-02: Dropped (moved to
RESPOND (RS) ID.IM-03)
RECOVER (RC): Restore
assets and operations that Incident Recovery Plan
Execution (RC.RP): Restoration RC.RP-01: The recovery portion of 1st: 1st Party Risk
the incident
RC.RP-02: response
Recovery plan isare
actions Ex1: Begin
1st: 1st recovery
Party Risk procedures
determined,
RC.RP-03: The scoped, prioritized,
integrity of backupsand Ex1: Select
1st: 1st recovery
Party Risk actions
and other restoration
RC.RP-04: assets
Critical mission is
functions Ex1: Check
1st: 1st restoration
Party Risk assets
and cybersecurity
RC.RP-05: risk management
The integrity of restored Ex1: UseParty
1st: 1st business
Risk impact and
assets
RC.RP-06: The criteria for and
is verified, systems Ex1:
1st: 1st Party Risk assets for
Check restored
Incident Recovery determining the end of incident Ex1: Prepare an after-action
Communication (RC.CO): RC.CO-01: Dropped (moved to
RC.CO-04)
RC.CO-02: Dropped (moved to
RC.CO-04)
CSF 2.0 Page 8 of 9
Function Category Subcategory Implementation Examples
RC.CO-03: Recovery activities and 1st: 1st Party Risk
progress
RC.CO-04:inPublic
restoring operational
updates on 3rd: 3rdParty
1st: 1st PartyRisk
Risk
Improvements (RC.IM): incident recovery are properly Ex1: Follow the organization's
Dropped (moved to ID.IM) RC.IM-01: Dropped (moved to
ID.IM-03)
RC.IM-02: Dropped (moved to
RECOVER (RC) ID.IM-03)

CSF 2.0 Page 9 of 9

You might also like