CISA Cybersecurity Performance Goals
a voluntary baseline for internal security teams
The CISA Cybersecurity Performance Goals (CPGs) are a voluntary, prioritised subset of cybersecurity practices CISA publishes for owners and operators across the sixteen critical infrastructure sectors and any organisation that wants a defensible baseline. CPGs v2.0 reorganises the goals against the NIST CSF 2.0 functions (GOVERN, IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER) and rates each goal on cost, complexity, and impact. This page covers the goal set, the NIST CSF 2.0 mapping, the cross-sector versus sector-specific split, the audit evidence each goal expects, and where CPGs sit alongside NIST CSF 2.0, CIS Controls, and the wider cybersecurity baseline regime.
No credit card required. Free plan available forever.
CISA Cybersecurity Performance Goals explained
The CISA Cybersecurity Performance Goals (CPGs) are the voluntary, prioritised cybersecurity baseline the Cybersecurity and Infrastructure Security Agency publishes for owners and operators across the sixteen critical infrastructure sectors and any organisation that wants a defensible operating floor. The CPGs are not a regulation. They are not a certification. They are a curated, cost-rated, complexity-rated, impact-rated subset of cybersecurity practices that CISA recommends as the minimum reasonable baseline.
CPGs v2.0, released in 2024, restructured the goal set against the NIST CSF 2.0 functions (GOVERN, IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER) and consolidated the cross-sector goal list at 38 goals. Each goal carries a defined Outcome, the Risks Addressed, the Recommended Action, and a rating on cost, complexity, and impact, plus an explicit mapping to NIST CSF 2.0 subcategories so the goal-to-subcategory walk is published rather than improvised.
For internal security teams, AppSec leaders, vulnerability management programmes, GRC owners, and CISOs, the CPGs are the most frequently asked-after baseline below NIST CSF 2.0 and alongside NIST CSF 2.0, CIS Controls, and Essential Eight. Programmes adopt them because the cost-complexity-impact rating turns prioritisation from argument into arithmetic, and the evidence the goals expect is the same operating record an internal security team is already building.
The six CPG functions in CPGs v2.0
CPGs v2.0 reorganises the goal set under the NIST CSF 2.0 function structure. The function ordering below mirrors the published goal numbering and is the order most adoption sequences follow. Each function carries a different evidence weight and a different audit cadence, and the functions compose into a continuous baseline rather than a one-time rollout.
GOVERN (1.A to 1.G)
Carries the leadership-side baseline. The seven goals cover account security, the security risk to mission and business operations, leadership accountability, supplier and supply chain risk, security skills and culture, the documented incident response plan, and the documented mitigation policy. CISA rates several GOVERN goals as low cost and high impact, which is why they sit at the start of the prioritised set.
IDENTIFY (2.A to 2.W)
Carries the asset, vulnerability, and risk visibility baseline. The 23 goals cover hardware and software asset inventory, vulnerability detection through scanning, third-party validation through assessments, the documented mitigation of CISA Known Exploited Vulnerabilities, and the structured risk assessment that downstream prioritisation reads against. The goals are deliberately ingestion-anchored: surveys do not satisfy the asset and vulnerability goals.
PROTECT (3.A to 3.X)
The largest CPG group. Carries the access-control baseline (MFA, separation of user and privileged accounts, unique credentials), the protective configuration baseline (changed defaults, disabled macros, segmented networks, hardened browsers, secure email gateways), the data protection baseline (data backups, log collection, encryption in transit), and the resilience baseline (against ransomware, credential reuse, unsupported software).
DETECT (4.A to 4.C)
Carries the security telemetry baseline. The three goals cover the collection of logs sufficient to detect malicious activity, the detection of suspicious behaviour against known TTPs, and the integration of security telemetry with the response process. The goals are outcome-anchored, not tool-anchored: the audit read is whether the operating record can reproduce the detection-to-response chain for a representative incident.
RESPOND (5.A)
Carries the incident response baseline. The single goal in this function names the documented practice of reporting incidents to CISA, sector-specific information sharing partners, and the relevant law enforcement contacts on a defined timeline. The goal works against the documented IR plan under GOVERN (1.G) and the detection capability under DETECT, and the evidence is the report log rather than the assertion.
RECOVER (7.A to 7.B)
Carries the resilience and continuity baseline. The two goals cover the incident planning and preparedness exercise cadence and the documented backup restoration testing that establishes the organisation can recover to a known-good state. Recovery goals are small in count but heavy on evidence weight: documented exercise records, restoration test results, and named owners of the recovery posture all live here.
The 38 cross-sector goals at a glance
The 38 cross-sector goals are the floor every critical infrastructure operator and most non-critical operators with comparable risk profiles can read against. The summary below groups the goals by function and names the operating outcome each function carries; the published CPG document carries the full goal-by-goal text, the cost rating, the complexity rating, the impact rating, and the recommended action per goal.
- GOVERN (7 goals): account security, OT cybersecurity leadership, mission risk, supply chain risk, basic cybersecurity training, OT cybersecurity training, vendor and supplier cybersecurity requirements.
- IDENTIFY (23 goals): asset inventory, vulnerability detection, no exploitable services on the internet, third-party validation of cybersecurity controls, third-party assessment, mitigation of known exploited vulnerabilities (CISA KEV), basic cybersecurity event reporting, deny-by-default network segmentation, structured risk assessment, asset classification, and the related discovery and visibility practices.
- PROTECT (24 goals): MFA on all internet-exposed services, change of default passwords, separation of user and privileged accounts, unique credentials, revocation of credentials for departing staff, minimum password strength, secure log practices, network segmentation, prohibition of macros from external sources, document trust mechanism, hardened web browser configuration, network monitoring at the perimeter, encrypted communications, the limited-availability of administrative interfaces, secure email gateway, and the wider technical-control baseline.
- DETECT (3 goals): log collection, security event monitoring, detection of suspicious behaviour against known TTPs, with detection coverage proportional to the asset and access scope.
- RESPOND (1 goal): incident reporting to CISA, the sector-specific information-sharing partner, and law enforcement on a documented timeline.
- RECOVER (2 goals): incident response planning and preparedness exercise cadence, and backup restoration testing.
How the CPGs map into NIST CSF 2.0 subcategories
CPGs v2.0 publishes an explicit mapping to NIST CSF 2.0 subcategories per goal, which is the feature that makes the CPGs a defensible first-wave subset rather than an alternate framework. The mappings below are representative of the operating ones programmes encounter most often; each CPG entry in the published document carries the full subcategory list per goal, and the cross-walk reads in both directions.
- GOVERN goals 1.A through 1.E read directly against NIST CSF 2.0 GV.OC (Organizational Context), GV.RM (Risk Management Strategy), and GV.RR (Roles, Responsibilities, and Authorities). The CPG is the named outcome; the CSF subcategory is the supporting practice.
- GOVERN goal 1.G (Incident Response Plan) reads against NIST CSF 2.0 RS.MA-01 and RS.MA-02. The CPGs treat the IR plan as a governance artefact rather than a response artefact, which mirrors how the plan is actually owned in most programmes.
- IDENTIFY goal 2.A (Asset Inventory) reads against NIST CSF 2.0 ID.AM-01 and ID.AM-02. CISA explicitly expects the inventory to be ingested rather than surveyed, which forces the goal off paper and onto the operating record.
- IDENTIFY goal 2.O (Mitigation of Known Exploited Vulnerabilities) reads against NIST CSF 2.0 ID.RA-08 and PR.PS-02. The goal references the CISA KEV catalog directly, with the documented timeline and the structured remediation evidence the audit read expects.
- PROTECT goal 3.A (MFA on internet-exposed services) reads against NIST CSF 2.0 PR.AA-03 and PR.AA-04. The CPG calls out internet-exposed services explicitly because that is where adversary access most often originates.
- PROTECT goal 3.B (Change Default Passwords) reads against NIST CSF 2.0 PR.AA-04. The goal is rated low cost and high impact in the CISA cost-complexity matrix.
- DETECT goal 4.A (Log Collection) reads against NIST CSF 2.0 DE.CM-01, DE.CM-03, and DE.AE-03. The CPG is outcome-anchored: log collection sufficient to detect malicious activity, not a specific SIEM product.
- RESPOND goal 5.A (Incident Reporting) reads against NIST CSF 2.0 RS.CO-04 and RS.CO-05. The reporting evidence is durable record, not narrative assertion.
- RECOVER goal 7.A (Incident Planning and Preparedness Exercises) reads against NIST CSF 2.0 RC.RP-01 and ID.IM-02. The exercise cadence is the audit read, with the post-exercise improvement record as the evidence.
- RECOVER goal 7.B (Backup Recovery Testing) reads against NIST CSF 2.0 PR.DS-11 and RC.RP-04. The test cadence and the restoration evidence are both required; an untested backup is not evidence under the framework.
A practical adoption sequence
The CPGs are designed to be operated in a sequence rather than addressed in parallel. The cadence below is the practical ordering most programmes follow when the CPGs are treated as the operating baseline rather than a checklist. The cycle compounds: each function inherits evidence from the prior function, so the audit pack at the end of the cycle is the residue of the operating work rather than a separate compilation.
- 1Establish the GOVERN baseline. Document the executive accountability, the cybersecurity leadership name, the cyber risk appetite, the supplier and supply chain expectations, the security awareness cadence, and the documented incident response plan. The GOVERN goals are the cheapest and the most evidence-dense; programmes that defer GOVERN end up reconstructing the documentation later under audit pressure.
- 2Build the IDENTIFY layer on the operating record. The asset inventory, the vulnerability detection cadence, and the KEV mitigation discipline all read off the workspace rather than off a survey. External scanning, authenticated DAST, code scanning, and continuous monitoring feed the identification record on a recurring schedule, with the activity log carrying the timestamps the audit pack reads against.
- 3Implement the PROTECT controls in cost-impact order. The CPGs publication includes a cost, complexity, and impact rating per goal so the prioritisation is published rather than improvised. MFA on internet-exposed services, change of default passwords, separation of user and privileged accounts, and unique credentials are the highest-impact-per-cost goals; segmentation, encryption, and configuration hardening follow.
- 4Stand up the DETECT capability against the asset coverage from IDENTIFY. Log collection sufficient to detect malicious activity, suspicious-behaviour detection against known TTPs, and the integration into the response process are the three goals; coverage proportional to asset and access scope is the audit expectation.
- 5Operate the RESPOND reporting discipline against the documented IR plan. Each incident from this point forward leaves a structured report record on the workspace, paired with the evidence the response produced (engagement record, finding, remediation, retest). The reporting log is the durable evidence the audit reads.
- 6Run the RECOVER exercise and restoration cadence. Tabletop exercises against the documented IR plan and backup restoration tests produce the recovery evidence the audit expects. The exercise improvement record is what feeds the next cycle, so the exercises stop being a one-off and become an operating discipline.
- 7Layer the sector-specific goals on top. Programmes operating in multiple sectors adopt the cross-sector goals as the floor and add the sector-specific goals (Water and Wastewater, Healthcare and Public Health, and the others CISA publishes per sector) per business unit, reading off the same evidence pack.
Failure modes the CPGs are designed to surface
The CPGs are forgiving on the choice of tooling, the operating cadence, and the prioritisation order within a function. They are unforgiving about a small number of patterns that turn the framework cosmetic rather than operational. The patterns below recur across CPG adoptions and are the ones that erode the year-over-year continuity the audit read expects.
- Treating the CPGs as an aspirational deck. CISA explicitly publishes cost, complexity, and impact ratings per goal so prioritisation is data-driven rather than rhetorical. Programmes that walk past the rating sheet end up adopting the goals in the wrong order and exhausting budget on high-cost goals before the low-cost foundational ones land.
- Surveying the asset inventory rather than ingesting it. The IDENTIFY goals are explicit that the inventory has to be a structured, queryable record. Spreadsheet surveys against business units satisfy the goal in name but fail under audit because the record cannot answer the question What is the current state of asset X today.
- Treating MFA on internet-exposed services as a partial rollout. CPG 3.A is a binary read: MFA is on every internet-exposed service or it is not. Programmes that ship MFA to most services and leave a long tail of exceptions discover under audit that the long tail is exactly where adversary access entered the network.
- Mixing the cross-sector goals with the sector-specific goals. The two are different layers. Programmes that adopt only the sector-specific list miss the cross-sector floor; programmes that adopt only the cross-sector list miss the sector refinement that CISA published because the sector posture demanded it.
- Confusing the CPGs with a NIST CSF 2.0 substitute. The CPGs are a prioritised subset, not a replacement. Programmes that adopt only the CPGs and stop have a defensible baseline but are not running NIST CSF 2.0 in full; that may be appropriate for the size and risk profile, but the gap should be a documented decision rather than an unstated drift.
- Letting the KEV mitigation goal drift. Goal 2.O is one of the most frequently audited CPGs because the CISA KEV catalog is a moving public list and the mitigation timeline is published. Programmes that do not feed the KEV catalog into the vulnerability management cadence on a recurring schedule fail the goal in real time without realising it.
Evidence the framework expects to see
The CPG evidence pack reads well when it is built as a side effect of the operating work rather than reconstructed at audit time. The minimum set below maps to the goals examiners, sector regulators, and audit committees most often read against, and the same artefacts feed parallel reads under NIST CSF 2.0, CIS Controls, the sector-specific CPG list, and the SEC cybersecurity disclosure rules when the underlying record is structured.
- GOVERN evidence: documented cybersecurity leadership, the executive sponsor, the named CISO or equivalent, the policy hierarchy, the cyber risk appetite statement, the supplier cybersecurity requirements, the security awareness training cohort and completion record, the documented incident response plan with assigned roles, and the OT cybersecurity training record where OT is in scope (goals 1.A to 1.G).
- IDENTIFY evidence: ingested hardware and software asset inventory with last-seen and ownership, the vulnerability detection cadence and the recent scan results, the third-party assessment record, the structured risk assessment, the deny-by-default network segmentation diagrams and rules, and the CISA KEV mitigation tracker showing each KEV entry with its mitigation status, owner, and timeline (goals 2.A to 2.W).
- PROTECT evidence: MFA enrolment evidence per service, the credential rotation log, the privileged-account separation record, the changed-default-password attestation per asset class, the secure-configuration baseline and exception register, the encryption-in-transit attestation, the macro-block configuration evidence, the secure-email-gateway configuration, the segmentation rule set, the hardened-browser baseline, and the limited-availability administrative interface evidence (goals 3.A to 3.X).
- DETECT evidence: the log collection scope, the retention period, the detection ruleset and the recent triggered events, the integration into the response workflow, and the named owners for detection coverage by asset and access scope (goals 4.A to 4.C).
- RESPOND evidence: the incident reporting log with each reported incident, the destination (CISA, sector-specific information-sharing partner, law enforcement), the timeline relative to the documented response plan, and the evidence pack referenced for each reported incident (goal 5.A).
- RECOVER evidence: the exercise cadence and the post-exercise improvement record, the backup restoration test schedule and the most recent restoration test result, the named owner of the recovery posture, and the integration of the lessons learned back into the GOVERN incident response plan (goals 7.A and 7.B).
How the CPGs relate to adjacent frameworks
The CPGs sit in a busy frameworks neighbourhood. The relationships below are the ones programmes encounter most often when they read the CPGs against the rest of the cybersecurity baseline regime. The relationships matter because programmes that try to operate each framework in isolation rebuild the same evidence multiple times.
CPGs vs NIST CSF 2.0
NIST CSF 2.0 is the comprehensive cybersecurity outcome framework. The CPGs are the prioritised subset CISA recommends as a voluntary minimum baseline, structured against the same six functions so the goal-to-subcategory mapping is direct. Programmes adopt NIST CSF 2.0 as the long-term framework and the CPGs as the prioritised first wave, with the same evidence pack reading across both.
CPGs vs CIS Controls
CIS Controls and CPGs occupy similar territory: prioritised, defensible baselines that are smaller than NIST CSF 2.0 and meant to be operated rather than read. CIS Controls v8.1 carries 18 controls with implementation groups (IG1, IG2, IG3) for sizing. CPGs v2.0 carries 38 goals rated on cost, complexity, and impact. Programmes that already operate CIS Controls IG1 cover most of the cross-sector CPGs, and programmes that adopt the CPGs find the IG2 and IG3 controls are the natural next layer.
CPGs vs Essential Eight
The Australian Signals Directorate Essential Eight is a similar prioritised baseline aimed at Australian government and critical infrastructure. The Essential Eight is narrower (eight strategies with three maturity levels) and more prescriptive than the CPGs, which span six functions and 38 goals. Both share the design philosophy of a prioritised, evidence-anchored subset, and programmes operating against both use the CPGs as the broader baseline and the Essential Eight as the harder-edged technical control set.
CPGs vs Cyber Essentials and Cyber Essentials Plus
The UK Cyber Essentials and Cyber Essentials Plus schemes are certification-anchored baselines administered by NCSC. They cover five technical control areas and culminate in an external assessment that issues the certification. The CPGs are voluntary and not certification-bound. Programmes operating in both regions adopt Cyber Essentials Plus where UK procurement requires it and the CPGs as the broader baseline that covers the GOVERN, RESPOND, and RECOVER ground Cyber Essentials does not address.
CPGs vs Sector-Specific CPGs
CISA publishes sector-specific CPGs for individual critical infrastructure sectors (Water and Wastewater Systems, Healthcare and Public Health, and others) on top of the cross-sector goal set. The sector-specific goals are not a replacement; they are a refinement that calls out the additional baseline an operator in that sector is expected to adopt on top of the cross-sector floor. The audit read against a sector-specific operator therefore covers both lists.
CPGs vs SEC Cybersecurity Disclosure
The SEC cybersecurity disclosure rules apply to public-company registrants and require Item 1.05 incident disclosures and Item 106 risk-management and governance disclosures. The CPGs are a voluntary baseline available to any organisation. Public-company registrants frequently adopt the CPGs because the GOVERN, IDENTIFY, and RESPOND evidence the CPGs expect cleanly populates the Item 106 disclosure narrative and the Item 1.05 incident pack.
Where SecPortal fits in a CPG programme
SecPortal is the operating layer for the CPG cycle, not a replacement for the CISA publication or for the sector-specific guidance the relevant agency maintains. The platform handles the CPG-side workstreams (engagement structure, finding intake, severity scoring, treatment dispositions, retest evidence, leadership reporting) so the inputs IDENTIFY, PROTECT, DETECT, and RESPOND expect are produced as structured records rather than reconstructed at audit time. The same workspace that hosts the engagement record hosts the external scanning, authenticated DAST, code scanning, and pentest evidence the IDENTIFY and PROTECT goals depend on, so the line from artefact to goal stays traceable.
- Engagement management dedicated to the CPG operating cycle, with workstreams per function (GOVERN, IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER) tracked as recurring engagements rather than one-off documents stitched together at the audit
- Findings management with CVSS 3.1 scoring, CWE tags, and structured fields so the vulnerability and configuration findings raised through external scanning, authenticated DAST, code scanning, and penetration testing feed the IDENTIFY goals (asset inventory, vulnerability detection, KEV mitigation) against the cadence the framework expects
- External scanning and authenticated scanning that feed the IDENTIFY goals on a continuous monitoring schedule, so the recent scan results required by goals 2.B, 2.C, and 2.W are produced as a side effect of the operating cadence
- Code scanning (SAST and dependency analysis) that feeds the IDENTIFY layer for first-party software and the supply-chain layer where the third-party-component findings inform the supplier risk goal under GOVERN (1.E)
- Continuous monitoring schedules (daily, weekly, biweekly, monthly) that establish the recurring cadence the IDENTIFY and DETECT goals expect, with the scan history establishing the audit trail rather than an attestation
- MFA enforcement and team management with role-based access that supports the PROTECT account-security baseline (goals 3.A, 3.D, 3.G), with the access-decision evidence reading into the activity log
- Encrypted credential storage (AES-256-GCM) for authenticated-scan credentials, supporting the PROTECT credential-handling baseline and the supplier-side requirements where SecPortal is itself the supplier
- Compliance tracking that reads the same evidence pack across CISA CPGs, NIST CSF 2.0, CIS Controls, ISO 27001, and the sector-specific CPGs, so the cross-framework footprint stays consistent rather than reconciled per audit
- Activity log with CSV export that captures every state change to a finding, an engagement, a credential, or a configuration record, so the auditor can reconstruct the operating cadence without a multi-team excavation
- AI report generation that turns the operating record into a board-ready CPG progress summary, a sector-specific report, and a cross-functional communication artefact without rewriting the underlying record
The IDENTIFY goals (especially 2.A asset inventory, 2.O CISA KEV mitigation, and 2.W documented vulnerability management) read against operational workflows that already exist as named use cases. The vulnerability prioritisation workflow translates the CISA KEV signal and the CVSS-plus-EPSS severity into the per-finding queue the goal expects. The vulnerability SLA management workflow carries the timeline discipline the KEV mitigation goal reads against. The scanner result triage workflow is the place where the scanning output the IDENTIFY function expects becomes structured findings rather than CSV exports, and the asset criticality scoring workflow carries the asset-tier discipline the CPG asset-inventory goal expects.
For internal security teams running the CPG baseline, the internal security teams workspace bundles the platform with the engagement structure the audit cadence reads against. For vulnerability management functions feeding the IDENTIFY layer, the vulnerability management teams workspace covers the lifecycle work that produces the operational signal goals 2.B, 2.C, and 2.O read against. For CISOs and security leaders carrying the GOVERN function, the CISOs and security leaders workspace covers the program-level reporting model that sits on top of the CPG operating record.
For deeper reading on the disciplines this framework reads against, the CISA KEV catalog guide covers the operational discipline goal 2.O expects against the moving public KEV list. The vulnerability management program guide covers the IDENTIFY-and-PROTECT operating cycle the cross-sector goals expect. The incident response plan guide covers the GOVERN goal 1.G plan-document expectation and the RESPOND and RECOVER goals it reads against. The security program KPIs and metrics framework covers the metric structure the GOVERN reporting goals (1.A and 1.G) read against. For analytical context on how cyber programmes age across compliance cycles, the security control drift research covers the patterns that erode CPG evidence between annual reviews when the audit is run only at announcement time.
Key control areas
SecPortal helps you track and manage compliance across these domains.
GOVERN goals (1.A to 1.G)
The GOVERN function carries the leadership-side baseline. The goals here cover account security, the security risk to mission and business operations, leadership accountability, supplier and supply chain risk, security skills and culture, and the documented incident response plan. The goals translate the executive accountability that NIST CSF 2.0 GOVERN expects into specific outcomes a small team can verify: an enabled MFA on internet-exposed services, a recorded asset inventory, a documented incident response plan with assigned roles, and a leadership-endorsed cybersecurity programme. CISA rates several of the GOVERN goals as low cost and high impact, which is the rationale for putting them first.
IDENTIFY goals (2.A to 2.W)
The IDENTIFY function carries the asset, vulnerability, and risk visibility baseline. The goals here cover hardware and software asset inventory, vulnerability detection through scanning, third-party validation through assessments, the documented mitigation of known exploited vulnerabilities (CISA KEV), and the structured risk assessment that downstream prioritisation reads against. CPGs v2.0 explicitly names the discipline of running a vulnerability programme that ingests external scanning, authenticated scanning, and code scanning output rather than manual surveys, and that tracks remediation against published timelines for known exploited vulnerabilities.
PROTECT goals (3.A to 3.X)
The PROTECT function is the largest CPG group by goal count. It carries the access-control baseline (MFA, separation of user and privileged accounts, unique credentials), the protective configuration baseline (changed default passwords, disabled macros, segmented networks, hardened browsers, secure email gateways), the data protection baseline (data backups, log collection, encryption in transit), and the resilience baseline (against ransomware, against credential reuse, against unsupported software). Programmes that adopt the CPGs sequentially typically consume most of the year on the PROTECT goals because they touch the largest number of operational systems.
DETECT goals (4.A to 4.C)
The DETECT function carries the security telemetry baseline. The goals here cover the collection of logs sufficient to detect malicious activity, the detection of suspicious behaviour against known TTPs, and the integration of security telemetry with the response process. The goals are intentionally outcome-anchored rather than tool-anchored: CISA expects detection capability sufficient to surface adversary behaviour, not a specific SIEM or EDR product. The audit read against this function is whether the operating record can reproduce the detection-to-response chain for a representative incident from the prior reporting cycle.
RESPOND goals (5.A)
The RESPOND function carries the incident response baseline. The single CPG in this function (5.A: Incident Reporting) names the documented practice of reporting incidents to CISA, sector-specific information sharing partners, and the relevant law enforcement contacts on a defined timeline. The goal works in concert with the documented incident response plan under GOVERN (1.G) and the detection capability under DETECT. The audit read is whether incidents from the prior cycle were reported on the documented timeline with the documented evidence pack rather than reconstructed after the fact.
RECOVER goals (7.A to 7.B)
The RECOVER function carries the resilience and continuity baseline. The goals here cover the documented incident planning and preparedness exercise cadence and the documented backup recovery testing that establishes the organisation can restore from backup to a known-good state. Recovery goals are smaller in count but heavy on evidence weight: a documented exercise record, a documented restoration test, and the named owners of the recovery posture sit under this function.
CPGs vs NIST CSF 2.0
CISA CPGs and NIST CSF 2.0 are complementary rather than competing. NIST CSF 2.0 is the comprehensive cybersecurity outcome framework. The CPGs are the prioritised subset CISA recommends as a voluntary minimum baseline, structured against the same six NIST CSF 2.0 functions so the goal-to-subcategory mapping is direct. Programmes adopt NIST CSF 2.0 as the long-term framework and the CPGs as the prioritised first wave, with the same evidence pack reading across both. CISA publishes the CPG-to-CSF subcategory mapping in the CPGs Discussion Draft and the CPGs v2.0 reference deck.
CPGs vs CIS Controls
CIS Controls and CPGs occupy similar territory: prioritised, defensible baselines that are smaller than NIST CSF 2.0 and meant to be operated rather than read. CIS Controls v8.1 carries 18 controls with implementation groups (IG1, IG2, IG3) for sizing. CPGs v2.0 carries 38 goals rated on cost, complexity, and impact. The two read well together: programmes that already operate CIS Controls IG1 cover most of the cross-sector CPGs, and programmes that adopt the CPGs find the IG2 and IG3 controls are the natural next layer. The choice between them is usually a question of audience: NIST CSF 2.0 and CPGs are the vocabulary CISA and US federal partners use, and CIS Controls are the vocabulary the broader practitioner community references.
Cross-sector goals vs sector-specific goals
The CPGs publication separates the cross-sector goals (the 38 goals that apply to any critical infrastructure organisation) from the sector-specific goals that CISA publishes for individual sectors (Water and Wastewater, Healthcare and Public Health, and others). Sector-specific goals are not a replacement for the cross-sector goals; they are a refinement that calls out the additional baseline an operator in that sector adopts on top of the cross-sector set. Programmes that operate in multiple sectors adopt the cross-sector goals as the floor and layer the sector-specific goals on top per business unit.
Related features
Vulnerability management software that tracks every finding
Compliance tracking without a full GRC platform
Test web apps behind the login
Vulnerability scanning tools that map your attack surface
Find vulnerabilities before they ship
Monitor continuously catch regressions early
Multi-factor authentication on every workspace
Every action recorded across the workspace
Operate the CPG baseline on a defensible record
Hold the asset, finding, scanning, KEV, MFA, response, and recovery evidence the CPGs expect on one workspace, then read the same record across NIST CSF 2.0, CIS Controls, and the sector-specific goals. Start free.
No credit card required. Free plan available forever.