Clock Icon  

NIST CSF 2.0: The National Standard for Cybersecurity

Person typing on a laptop with a digital overlay of a padlocked shield, symbolizing cybersecurity and data protection.

The NIST Cybersecurity Framework (CSF), developed by the U.S. National Institute of Standards and Technology was first released in 2014 to help critical infrastructure organizations manage cybersecurity risk. The CSF marked a turning point in cybersecurity by offering a scalable, adaptable model. It has helped organizations shift from reactive to proactive strategies and is now considered the gold standard in cybersecurity frameworks worldwide. 

Since then, it has become a globally recognized standard across industries. In 2024, NIST released version 2.0 to reflect broader adoption and evolving threats.

What Is the NIST Cybersecurity Framework?

The CSF is a voluntary, flexible guide designed to help organizations of all sizes and sectors manage and reduce cybersecurity risk. It’s not a checklist or a rigid set of rules, it’s a customizable framework that aligns with your organization’s maturity, resources, and risk tolerance.

What’s New in NIST CSF 2.0?

Version 2.0 introduces six core functions that represent the lifecycle of cybersecurity risk management:

1. Identify

Understand your assets, systems, data, and risks.

  • Document hardware, software, data, and personnel assets.
  • Classify data and systems by sensitivity and operational importance.
  • Map core business processes and dependencies.
  • Conduct regular vulnerability scans and penetration tests (best practice: rotate vendors periodically).
  • Run tabletop exercises and post-incident reviews.

2. Protect

Implement safeguards to ensure delivery of critical services.

  • Define access controls based on data classification.
  • Enforce password policies and multifactor authentication.
  • Encrypt sensitive data at rest and in transit.
  • Train staff on security awareness and phishing (at least annually).
  • Apply endpoint protection, firewalls, and web application firewalls (WAFs).

3. Detect

Develop activities to identify cybersecurity events.

  • Establish baselines for normal network behavior.
  • Use SIEM tools to monitor traffic and logs for anomalies.

4. Respond

Take action when a cybersecurity incident occurs.

  • Develop and regularly test an incident response plan (IRP).
  • Coordinate with legal, compliance, and insurance teams during incidents.

5. Recover

Restore capabilities and services after an incident.

  • Validate system integrity and data restoration.
  • Communicate with stakeholders throughout recovery.
  • Update policies and controls based on lessons learned.

6. Govern (New in 2.0)

Establish oversight and monitor your cybersecurity approach.

  • Define roles and responsibilities across the organization.
  • Align practices with legal, regulatory, and industry standards.
  • Monitor the effectiveness of each function and adapt as needed.
  • Ensure policies support both risk reduction and business goals.
  • Include cyber insurance as part of your risk transfer strategy.
  • Oversee supply chain risk and hold third parties accountable.

These functions are designed to work together—not in isolation—to create a holistic cybersecurity posture.

How to Use the Framework

Here’s a simple roadmap to begin aligning your organization with the CSF:

  1. Assess Your Current State
    Start with the Identify function. Document your current cybersecurity practices across all six functions.
  2. Define Your Target State
    Determine what “good” looks like for your organization based on your size, industry, and risk profile.
  3. Identify Gaps and Prioritize
    Compare your current and target states. Prioritize improvements based on impact and feasibility.
  4. Develop an Action Plan
    Create a roadmap with milestones, assign responsibilities and secure leadership support.
  5. Implement and Monitor
    Execute your plan, monitor progress, and adjust as needed. Keep leadership informed to maintain alignment and support.

We’re Here to Help – Contact Our Loss Control Consultants Today

At Great American Insurance Group, we strive to ensure that our policyholders are not only aware of the hazards they face but are equipped with the necessary tools to prevent and combat them as effectively as possible. Interested in learning more? Talk to our team of experts.

For additional information on improving your organization’s safety and security, visit the Plan & Protect Hub.

Loss Control Categories

Take proactive action to prepare for different types of loss.