What Is NIST Cybersecurity Framework? Core Functions, Tiers and Profiles
What is Managed IT Services?
What is Managed IT Services? Your Guide to Costs, Benefits and Common Challenges
April 11, 2025
Show all

What is the NIST Cybersecurity Framework?

Illustration of a digital globe with connected icons representing the NIST Cybersecurity Framework's components and core functions, including Framework Core, Implementation Tiers, and Profiles. The image symbolizes the 6 core functions of the NIST CSF: Govern, Identify, Protect, Detect, Respond, and Recover, emphasizing the interconnected nature of cybersecurity practices and risk management.

Before diving into what is NIST cybersecurity framework, it’s essential to understand why organizations need structured cybersecurity approaches.

In March 2025, Nova Scotia Power was hit by a ransomware attack. Hackers accessed the Social Insurance Numbers, bank details, and personal data of over 280,000 customers. The breach wasn’t found until late April and by May, the data was on the dark web. 

Even with cybersecurity protocols in place, critical infrastructure missed the threat for weeks. Delayed detection, poor communication, and weak post-attack support reveal a bigger issue: uncoordinated tools and reactive security practices. 

A proven solution? The NIST Cybersecurity Framework (CSF) offers a flexible template that works across all industries to manage cybersecurity risks in an effective and organized way.  From large enterprises to public utilities, it strengthens defenses—especially with expert-led implementation. 

 

What Is NIST Cybersecurity Framework? 

The NIST Cybersecurity Framework (CSF) is a guide document created by the National Institute of Standards and Technology to help organizations manage cybersecurity risks. It provides a taxonomy of high-level outcomes sorted into six core Functions—Govern, Identify, Protect, Detect, Respond, and Recover—and is supported by Profiles and Tiers. 

Rather than prescribing controls or technologies, the framework describes outcomes that organizations need to attain and also points to existing standards such as NIST SP 800-53 or ISO 27001 for implementation. 

It is voluntary, not limited to any specific industry, and suitable for organizations of any size or maturity level. 

 

A Brief History of NIST CSF 

  • 2013: President Obama signed Executive Order 13636, calling for a voluntary framework to address cybersecurity threats to be developed. 
  • 2014: NIST issued the first version (1.0) of the NIST Cybersecurity Framework. 
  • 2017: The framework was made mandatory for all U.S. government agencies with memo M-17-25. 
  • 2018: Version 1.1 was issued, with the addition of supply chain risk management guidance. 
  • 2024: Version 2.0 included the new ‘Govern’ function and further implementation guidance. 

 

The Three Components of the NIST Cybersecurity Framework 

 

The 6 Core Functions of the NIST Cybersecurity Framework 

The 6 Core elements of NIST CSF are Govern, Identify, Protect, Detect, Respond, and Recover. 

  1. Govern 

This function describes managing cybersecurity at the executive and policy level. This entails defining risk tolerance, defining roles and responsibilities, establishing governance over supply chain risk , and aligning cybersecurity with enterprise risk.  

Governance assists in shaping and directing the remaining five functions. Cyber security consulting often helps establish these structures. Subcategories are: 

  • Organizational Context (GV.OC) – Understanding of business mission, operating environment, and legal and regulatory requirements. 
  • Risk Management Strategy (GV.RM) – Establishing risk tolerance and risk management objectives. 
  • Roles, Responsibilities, and Authorities (GV.RR) – Deciding responsibility for cybersecurity outcomes. 
  • Policy (GV.PO) – Taking official policies to guide decisions and actions. 
  • Oversight (GV.OV) – Monitoring the efficacy of cybersecurity activity. 
  • Cybersecurity Supply Chain Risk Management (GV.SC) – Tackling third-party supplier and supply chain risks. 

 

  1. Identify

Identify offers insight into assets, data, systems, and processes. It includes asset management, vulnerability identification, threat modeling, and defining business context. These offer direction for risk prioritization and informed risk decisions. Cyber risk identification builds on this core competency. Subcategories: 

  • Asset Management (ID.AM) – Maintaining up-to-date inventories of systems, hardware, software, and data. 
  • Risk Assessment (ID.RA) – Determining likelihood and impact of cyber attacks. 
  • Improvement (ID.IM) – Strengthening identification activities to address changing risks. 

 

  1. Protect 

This role covers technical and administrative controls such as access control, staff training, data protection, secure setup, and resilience planning. Its aim is to reduce the impact of cybersecurity incidents.  

Implementation of controls is facilitated by Cyber Defense Solutions on various platforms. Subcategories are: 

  • Identity Management, Authentication, and Access Control (PR.AA) – Granting access solely to the authorized ones. 
  • Awareness and Training (PR.AT) – Training staff for threat detection and reporting. 
  • Data Security (PR.DS) – Protecting information by encrypting, backing up, and retaining it. 
  • Platform Security (PR.PS) – Protecting the IT platform and applications. 
  • Technology Infrastructure Resilience (PR.IR) – Leading system resilience and disaster recovery readiness. 

 

  1. Detect 

Detect detects anomalies, compromise indicators, and potential incidents by monitoring, correlating, and analyzing. Effective incident response is facilitated by Detect. A best-tuned threat detection service reduces mean time to detect (MTTD).  

Detect identifies threats discovered early by: 

  • Continuous Monitoring (DE.CM) – Automated tool monitoring activity and systems. 
  • Adverse Event Analysis (DE.AE) – Analyzing the anomalies and confirming whether they are incidents. 

 

  1. Respond 

Respond specifies processes for controlling, analyzing, and minimizing cybersecurity incidents. It includes notification of stakeholders, report of incident, and corrective action. Cyber response services guarantee continuity and confidence.  

Respond enables effective management of incidents, including: 

  • Incident Management (RS.MA) – Coordinating response actions. 
  • Incident Analysis (RS.AN) – Obtaining an understanding of the nature and scope of the incident. 
  • Incident Response Reporting and Communication (RS.CO) – Notifying stakeholders and reporting response. 
  • Incident Mitigation (RS.MI) – Reducing the impact and limiting the threats. 

 

  1. Recover

Recover enables organizations to return to normal operations successfully. It includes executing recovery plans, validating recovered assets, communicating recovery, and improving future preparedness. A cyber recovery solution enables fast recovery.  

Recover enables operational continuity and improvement through: 

  • Incident Recovery Plan Execution (RC.RP) – Implementing structured recovery processes. 
  • Incident Recovery Communication (RC.CO) – Communicating recovery progress and post-incident status. 

All of these functions are also subdivided into categories and subcategories, constructing the entire framework with 108 unique subcategories of cybersecurity outcomes. 

A diagram of the six core functions of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover, and Govern. These functions guide organizations in managing and reducing cybersecurity risk. The NIST framework emphasizes a holistic approach to cybersecurity, with an integrated cycle that includes governance, risk management, and continuous improvement.

What’s new in NIST Cybersecurity Framework 2.0? 

NIST CSF 2.0 in 2024 introduces the Govern function as the sixth core function to elevate cybersecurity governance to the executive level. The new framework expands beyond critical infrastructure to apply to all organizations. 

Significant new developments include enhanced supply chain risk management guidance, improved integration with other standards, and more emphasis on organizational cybersecurity governance.  

The framework provides clearer pathways for small and medium-sized businesses to implement cybersecurity programs. 

 

CSF Implementation Tiers: Maturity Levels 

The NIST Cybersecurity Framework contains four tiers that help you gauge the cybersecurity maturity of your organization: 

  1. Tier 1 (Partial): Limited awareness of cybersecurity risk with irregular, reactive cybersecurity practices 
  2. Tier 2 (Risk-Informed): Risk-informed but not organization-wide practices and policies 
  3. Tier 3 (Repeatable): Established policies with consistent practices across the organization 
  4. Tier 4 (Adaptive): Organization-wide strategy with risk-informed processes using near-real-time information 

Tiers help organizations make appropriate cybersecurity investments depending on their environment and risk tolerance. Better is not always higher—alignment with objectives is important. 

A graphical representation of the four tiers of the Cybersecurity Framework (CSF) for risk governance and management. The tiers, from Tier 1 to Tier 4, are categorized as follows: Tier 1 (Partial), Tier 2 (Risk-Informed), Tier 3 (Repeatable), and Tier 4 (Adaptive). Each tier progressively represents higher levels of cybersecurity risk management maturity, with Tier 4 being the most advanced.

 

CSF Organizational Profiles: Current vs. Target State 

Organizational Profiles map an organization’s cybersecurity posture to CSF results. 

  1. A Current Profile describes existing practices and their maturity. 
  1. A Target Profile defines wanted outcomes correlated to mission priorities and evolving threats. 

Comparing the two helps identify gaps, prioritize remediation, and communicate status internally or with third parties. Profiles can be scoped narrowly (e.g., cloud systems) or broadly (entire enterprise). 

Organizations may also tap into Community Profiles in setting sector-specific baselines. 

An infographic illustrating the steps to create and utilize a Cybersecurity Framework (CSF) Organizational Profile. The steps include: Scoping the organizational profile, gathering necessary information, creating the profile, analyzing gaps, implementing action plans, updating the profile, and repeating the process. The organizational profile helps businesses align their cybersecurity efforts with risk management strategies.

 

Key Benefits of CSF Implementation 

  1. Better Risk Awareness: Clear understanding of threats, vulnerabilities, and impact. 
  2. Improved Incident Response: Structured detection and response procedures. 
  3. Improved Communication: Shared language among executive, operational, and technical teams. 
  4. Faster Recovery: Defined recovery plans reduce downtime. 
  5. Audit Readiness & Compliance: Supports ISO 27001, HIPAA, and other frameworks. 
  6. Cyber Insurance Enablement: Demonstrates maturity for policy eligibility. 

Companies that use the CSF report measurable improvements in risk stance and business resilience. 

 

Next Steps: Turning Strategy into Action 

Implementing NIST CSF 2.0 is more than just understanding the framework. 

If you’re ready to move from planning to execution, consider partnering with a stable, experienced cybersecurity provider who understands how to translate CSF outcomes into real-world resilience. Make your next move a confident one and secure your business today so you can focus on what matters. 

At Delvetek Consulting, we help organizations in: 

  • Define clear governance and risk strategies. 
  • Streamline compliance and supply chain risk management. 

Regardless if you’re developing your first Profile or moving towards Tier 3 or 4 maturity, our experience reduces risk and improves readiness for operations. 

Explore how Delvetek can support your cybersecurity journey from governance and risk strategy to cloud security and compliance. Consult Us.

 

 

Frequently Asked Questions 

Does NIST CSF help with cyber insurance? 

Many cyber insurance providers offer premium discounts for organizations demonstrating mature cybersecurity practices through frameworks like NIST CSF. The framework helps document due diligence efforts and risk management capabilities. 

Insurance underwriters use CSF implementation maturity to assess organizational risk. Strong framework implementation can lead to better coverage terms, lower deductibles, and reduced premium costs for cyber liability insurance. 

 

What compliance requirements does NIST CSF address? 

The framework aligns with numerous regulations including HIPAA, SOX, PCI DSS, and FISMA. Organizations use CSF mapping to demonstrate compliance with multiple regulatory requirements through unified cybersecurity programs. 

Federal agencies must use the framework to manage cybersecurity risks. State and local governments increasingly adopt CSF to improve security posture and justify budget requests to stakeholders. 

 

Is the NIST CSF mandatory for private companies? 

No, the NIST Cybersecurity Framework is voluntary for private-sector organizations. However, many adopt it to demonstrate due diligence, align with vendor requirements, and improve security posture. Certain industries—especially those handling sensitive data—are increasingly expected to follow it. 

 

How long does it take to implement NIST CSF? 

Implementation time varies. A small business with minimal infrastructure may need 2–3 months for a basic Profile. For larger enterprises or those aiming for Tier 3–4 maturity, the process could take 6–12 months and involve phases like assessment, planning, rollout, and review. 

 

Can NIST CSF work alongside ISO 27001 or other standards? 

Yes. NIST CSF is designed to be framework-compatible. Many organizations use it to bridge ISO 27001, COBIT, or NIST SP 800-53. The Framework’s flexibility allows mapping to existing security controls, making it easier to unify compliance reporting across standards. 

Comments are closed.