The Cybersecurity Framework (CSF) by the National Institute of Standards and Technology (NIST) is undergoing a significant update. Initially launched in 2014, the NIST CSF has become one of the most extensively used cybersecurity frameworks, helping organizations in understanding and controlling cybersecurity vulnerabilities. NIST has modernized their framework with their release of CSF 2.0, to harmonize with the latest trends and practices in cybersecurity. 

Govern Pillar Update:

NIST CSF is known for the main five pillars of: Identify, Protect, Detect, Respond, and Recover. As a part of its 2.0 update, NIST is contemplating the integration of a sixth pillar, Govern. NIST’s intention behind introducing the Govern function is to highlight the importance of “organization’s cybersecurity risk management strategy, expectations, and policy”. [1] 

Initial thoughts on the Govern Pillar: 

The incorporation of the “Govern” function introduces a framework for structuring cybersecurity strategies that align directly with business objectives. Through the establishment of well-defined goals, objectives, and policies that govern the entirety of the cybersecurity program, a deliberate effort is made to ensure harmony with the organization’s overarching business goals. This inclusive approach integrates the business dimension, enabling businesses to proficiently manage risks in order to protect their assets, maintain their reputation, and sustain operations, even in the midst of constantly evolving threats. 

Within the CSF, I believe that the inclusion of the Govern pillar entails aligning cybersecurity strategic plans with business objectives through the following means:

Increased Accountability. By assigning roles and responsibilities across different levels, it designates accountability  for decision-making, risk assessment, and compliance with cybersecurity policies and regulations.

Compliance.  There is an alignment with incorporating relevant standards, regulations, and best practices to demonstrate compliance with legal and regulatory requirements. This allows organizations to maintain a consistent level of cybersecurity across the industry.

Incident Response. Enhancement of crisis management to ensures that the organization has a well-defined plan to minimize the impact of incidents and recover quicky.

Improvement. Govern embraces a culture of continuous improvement. With the regular assessments, audits, and reviews to identify areas for enhancement and adjustment. 

Risk Management. Organizations identify, assess, and prioritize cybersecurity risks based on their potential impact and likelihood, and then implement appropriate mitigation strategies.

Policy Incorporations. With defined policies, procedures, and controls, organization can address specific risks that are consistent with industry and the best practices and regulatory requirements.

Resource allocation. Maintaining an organization that has the necessary tools and personnel to effectively manage cybersecurity risks.

Increased Communication. Embeds communication between technical and non-technical stakeholders, to ensure cybersecurity matters are effectively communicated, therefore,relevant metrics and reports are provided to enable informed decision-making.

Overall Thoughts on the 2.0 Update 

The significance of updating the NIST CSF is rooted in its capacity to reflect the latest advancements in cybersecurity knowledge and practices. The CFT 2.0 update ensures that the framework remains an effective and relevant tool, providing organizations with current insights and strategies to safeguard against emerging threats, thus promoting heightened resilience and proactive cybersecurity measures.

There is an enhanced focus on supply chain risk, which is rooted in the critical role that supply chains play in today’s interconnected business environment. Addressing supply chain risk within the framework recognizes the potential vulnerabilities and threats that can emerge from third-party vendors and partners that can enhance organizational cybersecurity. 

While the NIST CSF doesn’t have a direct focus on global political conflicts, its underlying principles and best practices play a substantial role in the overall cybersecurity readiness of both organizations and nations.The CSF’s importance lies in its emphasis on improving cybersecurity practices and resilience across sectors, surrounding critical infrastructures, government entities, and private enterprises. This, in turn, enhances their ability to mitigate risks and respond effectively to cyber threats that might arise during times of international tensions.

NIST encourages feedback on the new CFT. Below were my submitted suggestions: 

Section 

Location  

Suggestion 

Govern

GV.OC-02: Internal and external stakeholders are determined, and their needs and expectations regarding cybersecurity risk management are understood

Wording changes to add clarity in identifying and defining stakeholders and expectations.

Proposed change: Internal and external stakeholders are identified, and their needs and expectations regarding cybersecurity risk management are defined.

Govern 

GV.RM: The organization’s priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions (formerly ID.RM)

Assumptions should not be defined, rather expectations should be. 

Proposed change: The organization’s priorities, constraints, risk tolerance and appetite statements, and expectations are established, communicated, and used to support operational risk decisions. 

Govern

GV.RM-07: Strategic opportunities (i.e., positive risks) are identified and included in organizational cybersecurity risk discussions

The term positive risks does not need to be defined, it creates a detraction of importance with  other strategic opportunities . 

Govern

GV.SC-06: Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships 

Due diligence is vague, consider defining the expectations for this. 

Govern

GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement 

Consider expanding plans to include all stages of partnership not just after events.

Govern 

GV.RR-02: Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced (formerly ID.AM-06, ID.GV-02, DE.DP-01) 

Should include roles and responsibilities being continuously reviewed against the organization’s focus. 

Govern

GV.RR-03: Adequate resources are allocated commensurate with cybersecurity risk strategy, roles and responsibilities, and policies

Stating “adequate” resources is unnecessary when adequate is not defined. 

Identify 

ID.AM-01 /  ID.AM-02

ID.AM-01: Inventories of hardware managed by the organization are maintained 

ID.AM-02: Inventories of software, services, and systems managed by the organization are maintained

Consider being inclusive of all assets managed outside the organization, while impacting the organization. 

Identify

ID.AM-03: Representations of the organization’s authorized network communication and internal and external network data flows are maintained (formerly ID.AM-03, DE.AE-01)

The organization’s approved network communication should encompass both internal and external channels. Avoiding the separation of network data flows based on the type of communication is recommended. 

Identify

ID.AM-04: Inventories of services provided by suppliers are maintained 

Services and assets should be included for inventories. 

Identify

ID.AM-07: Inventories of data and corresponding metadata for designated data types are maintained

Does the inclusion of metadata data include the logs designated to the data types? 

Identify

ID.RA-01 / ID.RA-02

ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded 

ID.RA-02: Cyber threat intelligence is received from information sharing forums and sources

The categories should encompass the requirement not only to receive cyber threat intelligence but also to seamlessly integrate it into the organization’s risk management procedures. Additionally, the categories should outline actionable measures involving vulnerabilities in assets that need enhancement.

Identify 

ID.RA-06: Risk responses are chosen from the available options, prioritized, planned, tracked, and communicated 

Consider adding a section to address lessons learned from an incident to increase security. 

Identify

ID.IM-04: Cybersecurity plans that affect operations are communicated, maintained, and improved (formerly PR.IP-09)

Expand to all cybersecurity plans, rather than those that only affect operations. 

Protect

PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization (formerly PR.AC-01)

There should also be constant protection for identities and credentials of authorized users. 

Proposed change: Identities and credentials for authorized users, services, and hardware are managed and protected by the organization. 

Protect

Awareness and Training (PR.AT): The organization’s personnel are provided cybersecurity awareness and training so they can perform their cybersecurity-related tasks

Organization’s personnel impacting cybersecurity should have defined roles and expectations in order to impose training. 

Protect

PR.DS-01 / PR.DS-02

PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected

PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected 

Consider moving PR.DS-10 under here for continuity as they are all correlated. 

Protect

PR.DS-09: Data is managed throughout its life cycle, including destruction 

Singling out “destruction” is too descriptive and should be addressed in implementation examples. Destruction is included in the life cycle already. 

Protect

PR.DS-11: Backups of data are created, protected, maintained, and tested

Backups of data should also be verified. Consider incorporating “verified” into a category. 

Protect

PR.PS-04: Log records are generated and made available for continuous monitoring

Log records that are generated should not only be used for continuous monitoring, but also for proactive change for strength of the framework. 

Protect

PR.PS-05: Installation and execution of unauthorized software are prevented 

For unauthorized software installation prevention – if software needs installation it is verified and added to the authorized list. 

Protect

PR.IR-01: Networks and environments are protected from unauthorized logical access and usage

Networks and environments should also be continuously protected from unauthorized logical access and usage.

Detect

DE.AE-02: Potentially adverse events are analyzed to better understand associated activities

Adverse events narrows down the type of events that should be reviewed, when all impacting events should be reviewed. 

Detect

DE.AE-07: Cyber threat intelligence and other contextual information are integrated into the analysis

As cyber threat intelligence and other contextual information are integrated into the analysis, there should also be a proactive step included for cybersecurity protection.

Detect

DE.CM-01: Networks and network services are monitored to find potentially adverse events

Not only to locate adverse events in the detect stage, but any event that may threaten the security of a system. 

Respond

RS.AN-08: The incident’s magnitude is estimated and validated 

Incidents are not validated, rather they are irradiated and addressed for impact. 

Recover 

RC.RP-03: The integrity of backups and other restoration assets is verified before using them for restoration

Integrity of backups and other restoration assets should be verified before storage too. 

 

Reference:

[1] National Institute of Standards and Technology. (2023). NIST Cybersecurity Framework 2.0 Core Discussion Draft [Draft]. https://www.nist.gov/system/files/documents/2023/04/24/NIST%20Cybersecurity%20Framework%202.0%20Core%20Discussion%20Draft%204-2023%20final.pdf