NIST CSF 2.0
the six functions, the GOVERN addition, and the audit-ready evidence
NIST Cybersecurity Framework 2.0 is the February 2024 revision of the NIST CSF. It promotes governance to a first-class core function, restructures the categories and subcategories, replaces the legacy NIST CSF 1.1 critical-infrastructure framing with a sector-agnostic posture, and ships a Profile model and Implementation Examples designed for direct use by AppSec, vulnerability management, GRC, and security leadership functions. This page covers the six functions, the new GOVERN function in operating practice, the four Tiers, the Current and Target Profile model, the Implementation Examples, the Informative References, and the evidence pack a workspace-driven programme keeps in one place.
No credit card required. Free plan available forever.
NIST Cybersecurity Framework 2.0 explained
NIST Cybersecurity Framework 2.0 is the February 2024 revision of the NIST CSF, published as NIST CSWP 29. It is the first material revision since CSF 1.1 in 2018, and it changes the framework in four substantive ways. GOVERN is promoted to a sixth first-class function on equal footing with Identify, Protect, Detect, Respond, and Recover. The framing moves from critical-infrastructure-specific to sector-agnostic so adopters in healthcare, retail, education, software, manufacturing, and small business read against their context directly. Cybersecurity Supply Chain Risk Management (formerly ID.SC) moves into the new GOVERN function as GV.SC. Implementation Examples ship beneath each subcategory, the Profile model is formalised with Community Profiles for sectors and use cases, and a family of Quick-Start Guides translates the framework into actionable starting points for small business, enterprise risk management, supply chain risk, and several other contexts.
For internal AppSec teams, vulnerability management functions, GRC owners, security engineering teams, and CISOs, CSF 2.0 is the universal vocabulary that lets a single engagement record be read against multiple regulators, customers, and standards. Programmes that already operate against ISO 27001, NIST SP 800-53, or SOC 2 do not need to migrate; CSF 2.0 sits on top of the underlying control catalogue through the Informative References cross-walk.
The six core functions of CSF 2.0
CSF 2.0 organises cybersecurity activity into six core functions that together describe the lifecycle of a cybersecurity programme. The function names are the highest-level vocabulary the framework uses; the categories and subcategories beneath each function are what the work is actually planned and reported against.
GOVERN (GV)
New in CSF 2.0. Establishes the cybersecurity risk management strategy, expectations, and policy. Six categories: Organizational Context (GV.OC), Risk Management Strategy (GV.RM), Roles, Responsibilities and Authorities (GV.RR), Policy (GV.PO), Oversight (GV.OV), and Cybersecurity Supply Chain Risk Management (GV.SC). The function carries the executive accountability the framework expects, and it is the place where leadership tolerance, programme oversight, and supplier governance become evidence rather than assertion.
IDENTIFY (ID)
Develops the organisational understanding the rest of the programme reads against. Three categories: Asset Management (ID.AM), Risk Assessment (ID.RA), and Improvement (ID.IM). The Supply Chain Risk Management category that lived under Identify in CSF 1.1 has moved to GOVERN (GV.SC), which reflects that supply-chain risk is a governance decision rather than an asset-discovery decision.
PROTECT (PR)
The safeguards that prevent or limit the impact of cybersecurity events. Five categories: Identity Management, Authentication, and Access Control (PR.AA), Awareness and Training (PR.AT), Data Security (PR.DS), Platform Security (PR.PS), and Technology Infrastructure Resilience (PR.IR). PR.AA consolidates the access-control and authentication practices that lived in two CSF 1.1 categories, tightening the function around identity-centric security.
DETECT (DE)
The activities that find cybersecurity events in time to respond. Two categories: Continuous Monitoring (DE.CM) and Adverse Event Analysis (DE.AE). Detect is the function most simplified relative to CSF 1.1; the legacy detection-process category is folded into the operating discipline most programmes already run.
RESPOND (RS)
The activities taken when a cybersecurity event is detected. Four categories: Incident Management (RS.MA), Incident Analysis (RS.AN), Incident Response Reporting and Communication (RS.CO), and Incident Mitigation (RS.MI). The lifecycle vocabulary tightens so the engagement record reads against named subcategories rather than free-text narrative.
RECOVER (RC)
The activities that restore the assets and services impaired by an incident, and that fold the lessons learned back into the programme. Two categories: Incident Recovery Plan Execution (RC.RP) and Incident Recovery Communication (RC.CO). Recover is the smallest function by category count, but it is where the post-incident state is recorded as restored to a known-good baseline.
The new GOVERN function in operating practice
GOVERN is the headline change in CSF 2.0. The function consolidates and expands the governance practices that were dispersed across CSF 1.1 categories, with six subcategory groups that name the operating discipline a cybersecurity programme is expected to record against. The list below is the practical content of the function, expressed in the vocabulary the framework uses and what each group looks like in a workspace-driven programme.
- GV.OC: Organizational Context. The mission, stakeholders, legal and regulatory obligations, and critical functions the cybersecurity programme protects. This is where the programme records why the work is being done, not just what is being done.
- GV.RM: Risk Management Strategy. The cybersecurity risk tolerance, the risk acceptance criteria, the risk appetite by category, and the cycle on which leadership reviews them. The strategy is the input the rest of the programme prioritises against.
- GV.RR: Roles, Responsibilities, and Authorities. The named roles for cybersecurity, the scope of authority each role carries, and the line back to executive accountability. CSF 2.0 explicitly expects this to be documented and reviewable, not implicit.
- GV.PO: Policy. The policy hierarchy that the programme operates against (information security policy, acceptable use, change management, incident response, exception management). Policy lives under GOVERN because it is a governance instrument, not a control.
- GV.OV: Oversight. The cadence and mechanisms by which leadership reviews cybersecurity programme outcomes, including risk management decisions, incident outcomes, and Profile progress. Oversight is what keeps GOVERN active rather than declarative.
- GV.SC: Cybersecurity Supply Chain Risk Management (formerly ID.SC). The supplier risk identification, supplier security expectations, contractual security requirements, supplier monitoring, and the response when a supplier incident affects the organisation. C-SCRM lives in GOVERN because it is a governance decision, not an asset-discovery decision.
How CSF 2.0 differs from CSF 1.1
Programmes already operating against CSF 1.1 can adopt CSF 2.0 incrementally; the core ideas (functions, categories, subcategories, Tiers, Profiles) are stable, and the Informative References preserve the cross-walk to the underlying control catalogues. The differences below are the substantive ones the planning and the evidence pack will need to reflect.
GOVERN promoted to a first-class function
CSF 1.1 dispersed governance practices across Identify (ID.GV), Risk Management Strategy, and pieces of Protect. CSF 2.0 promotes GOVERN to a sixth core function on equal footing with the other five. The change is structural, not cosmetic: leadership accountability, risk tolerance, programme oversight, and Cybersecurity Supply Chain Risk Management (GV.SC) now have a named home rather than an inherited footnote.
Sector-agnostic framing
CSF 1.1 was framed around critical infrastructure. CSF 2.0 is explicitly framed for organisations of any size, sector, or maturity. The change matters because adopters in healthcare, retail, education, software, and small business no longer need to rationalise away the critical-infrastructure language; the framework now reads against their context directly.
Supply chain moved to GOVERN
CSF 1.1 carried supply chain risk management under Identify as ID.SC. CSF 2.0 moves the equivalent category to the new GOVERN function as GV.SC. The relocation reflects that supplier risk decisions are governance decisions: who the organisation does business with, what the contract requires, what the oversight cadence is, and how supplier incidents are surfaced.
Implementation Examples beneath subcategories
CSF 1.1 stopped at the subcategory and left implementation as a reader exercise. CSF 2.0 ships Implementation Examples beneath each subcategory, naming concrete actions the organisation can take. Implementation Examples are not requirements; they are illustrative, and the framework explicitly states that organisations can choose other actions to satisfy the subcategory.
Profile model formalised
CSF 1.1 mentioned Profiles, but CSF 2.0 formalises the Current Profile and Target Profile concepts and adds the Community Profile published for sectors and use cases. The Profile model is the planning instrument the framework uses to translate the categories and subcategories into the organisation-specific posture.
Quick-Start Guides for adoption
CSF 2.0 ships Quick-Start Guides aimed at small businesses, enterprise risk management functions, organisations focused on cybersecurity supply chain risk management, and several other adopter contexts. The guides translate the framework into actionable starting points so a programme can begin without reading the whole document end to end.
Implementation Tiers
The four Tiers describe the rigour and integration of cybersecurity risk management practices, not the maturity of any individual control. CSF 2.0 explicitly notes that not every organisation needs Tier 4; the right Tier depends on the risk environment, the regulatory exposure, and the resourcing the GOVERN function makes available. The Tier choice is a leadership conversation that lives in GV.RM rather than a default-upward target every programme aims for.
Tier 1: Partial
Cybersecurity risk management is reactive and ad hoc. Risk awareness is limited; cybersecurity activities are not formalised; the organisation may not have processes to share cybersecurity information internally. Many programmes start here before adopting a structured framework.
Tier 2: Risk Informed
Risk management practices are approved by management but may not be established as organisation-wide policy. There is awareness of cybersecurity risk at the leadership level, but a consistent approach across business units has not been fully implemented.
Tier 3: Repeatable
Risk management practices are formally approved and expressed as policy. Practices are regularly updated based on changes in the threat landscape and business requirements. Processes are consistent and repeatable across the organisation, including supplier-facing relationships.
Tier 4: Adaptive
Cybersecurity risk management is driven by lessons learned and predictive indicators. Continuous improvement is embedded in the organisational culture. CSF 2.0 explicitly notes that not every organisation needs Tier 4; the right Tier depends on the risk environment, not on a universal aspiration.
The Profile model: Current, Target, and Community Profiles
Profiles are the planning instrument CSF 2.0 uses to translate the categories and subcategories into the organisation-specific posture. A Profile is a selection of subcategories the programme is operating against, with the evidence references that support each. Programmes that take Profiles seriously gain a planning instrument that scales across business units; programmes that treat the Profile as an annual paperwork exercise lose the prioritisation the model is designed for.
- Current Profile: the subcategory-by-subcategory description of what the organisation does today, with the evidence that supports each claim. The Current Profile is the inventory of the present state; it is honest about what is in place and what is not.
- Target Profile: the subcategory-by-subcategory description of what the organisation wants to do in the planned horizon, informed by risk tolerance from the GOVERN function and by business priorities. The Target Profile is the planning destination, not an aspiration.
- Gap analysis: the named differences between the Current Profile and the Target Profile, prioritised by risk and resource cost. The gap is the planning input that feeds the next-cycle work.
- Action plan: the concrete work that closes the gap, with named owners, deadlines, evidence expectations, and the subcategory each action is tied to. The action plan is what the engagement record holds across the cycle.
- Community Profile: a published Profile for a sector or use case (such as the Manufacturing Profile, the Election Security Profile, or the Small Business Profile) that an organisation can adopt as a vetted starting point and tailor rather than assemble from scratch.
How a CSF 2.0 programme operates across the cycle
A CSF 2.0 programme runs as a structured engagement rather than an annual report. The cycle below is the practical ordering most teams follow when CSF 2.0 is treated as the operating framework rather than a reporting wrapper. The cycle compounds: each re-baseline starts from the prior Current Profile, the gap closes year over year, and the evidence pack accumulates rather than being rebuilt.
- 1Establish the GOVERN baseline. Name the executive owner, document the cybersecurity risk management strategy, record the risk tolerance, publish the policy hierarchy, and capture the supplier oversight model. The GOVERN baseline is the input every other function reads against.
- 2Build the Current Profile. Walk the six functions and the categories beneath each, capture what the organisation does today against each subcategory, and link the supporting evidence (control documentation, configuration baselines, scan output, training records, incident logs). The Current Profile is the honest inventory.
- 3Build the Target Profile. Decide which subcategories the next planning cycle will move on, informed by GOVERN-stated risk tolerance, and record the destination state with the evidence the Target subcategory will produce. Borrow from a relevant Community Profile where one applies.
- 4Run the gap analysis. Compare Current to Target subcategory by subcategory, prioritise by risk and dependency, and produce the action plan with named owners and deadlines. The gap analysis is the artefact that drives the cycle.
- 5Operate against the action plan. Run the work as a structured engagement rather than a spreadsheet. Capture the per-action evidence as it is produced (a configuration change, a closed finding, a published policy, a completed training cohort, a tabletop exercise transcript), tagged to the subcategory it supports.
- 6Report and re-baseline. Roll the per-subcategory progress into the leadership report, refresh the Current Profile to reflect the new state, and start the next cycle from the new baseline rather than from a blank page. The re-baseline is what makes the framework durable across leadership turnover.
Failure modes the framework is designed to surface
CSF 2.0 is forgiving on the choice of controls, the choice of Tier, and the choice of Profile. It is unforgiving about a small number of patterns that make the framework cosmetic rather than operational. The patterns below are the ones that recur across adoptions and that erode the year-over-year continuity the framework relies on.
- Treating GOVERN as a slide deck rather than an operating function. The new function exists because dispersing governance across other functions in CSF 1.1 made it possible to claim governance without recording it. Programmes that adopt CSF 2.0 without operationalising GV.OC, GV.RM, GV.RR, GV.PO, GV.OV, and GV.SC inherit the same gap they were trying to close.
- Treating Implementation Examples as requirements. The Examples are illustrative; the framework explicitly says other actions can satisfy the subcategory. Programmes that copy the Examples verbatim without checking that they satisfy the subcategory in the local context end up with an unfit Profile and an evidence pack that does not read against the work the team actually did.
- Skipping the Tier conversation. The four Tiers are a leadership discussion, not a maturity ladder every organisation must climb. Programmes that default to Tier 4 without considering the cost and the risk environment commit to operating discipline they cannot sustain.
- Mixing Profiles across business units without a reason. CSF 2.0 explicitly contemplates multiple Profiles within one organisation when business units carry different risk contexts. Programmes that force a single Profile across heterogeneous business units lose the targeted prioritisation the Profile model is designed for.
- Failing to refresh the Current Profile after the action plan lands. The Profile is not a static document; it is the rolling inventory of what the organisation does. Programmes that keep the original Current Profile pristine and never update it lose the year-over-year continuity the framework relies on.
- Treating CSF 2.0 as a replacement for SP 800-53, ISO 27001, or sector regulations. CSF 2.0 is an outcome framework, not a control catalogue. The Informative References explicitly cross-reference to the catalogues an organisation already operates against. The framework sits on top of the catalogue rather than replacing it.
Evidence the framework expects to see, organised against the functions
The CSF 2.0 evidence pack reads well when it is built as a side effect of the operating work rather than reconstructed at the year-end. The minimum set below maps to the subcategories examiners and customer auditors most often ask against, and the same artefacts feed parallel reads under ISO 27001, SOC 2, NIST SP 800-53, PCI DSS, and Cyber Essentials when the underlying record is structured.
- Documented Current Profile and Target Profile with named owners, evidence references per subcategory, and the gap analysis the action plan reads from
- Risk management strategy document covering risk tolerance, acceptance criteria, and the leadership review cadence (GV.RM)
- Cybersecurity policy register covering the policy hierarchy, the review cycle, the named owner per policy, and the dated approval (GV.PO)
- Oversight record showing leadership review meetings with cybersecurity outcomes on the agenda, named attendees, and the decisions taken (GV.OV)
- Cybersecurity Supply Chain Risk Management register covering supplier inventory, supplier risk classification, contract security requirements, and supplier monitoring evidence (GV.SC)
- Asset inventory and asset-criticality classification with the evidence references that support each entry (ID.AM)
- Risk assessment record covering threats, vulnerabilities, likelihoods, impacts, and the resulting risk treatment decisions (ID.RA)
- Identity management, authentication, and access control evidence covering account lifecycle, privilege management, and authentication strength (PR.AA)
- Continuous monitoring evidence covering scanner coverage, scan cadence, finding intake, and the operational handling of monitoring output (DE.CM)
- Incident response record covering each incident from declaration through to closure, with the named decision points and the post-incident improvements logged (RS.MA, RC.RP)
- Improvement register covering lessons learned from incidents, exercises, and assessments, with the resulting changes back into the Current Profile (ID.IM)
How CSF 2.0 relates to ISO 27001, NIST SP 800-53, SOC 2, and the wider regime
CSF 2.0 is an outcome framework, not a control catalogue. The Informative References published with the framework cross-walk every subcategory to NIST SP 800-53, ISO 27001, COBIT, and other widely adopted standards, so a programme already operating against one of those catalogues uses CSF 2.0 as the outcome overlay rather than a competing framework. The relationships below are the ones programmes most often need to read together.
- The ISO 27001 framework page covers the certifiable Information Security Management System standard. Annex A controls map cleanly to CSF 2.0 subcategories through the Informative References, so an ISO 27001 ISMS produces most of the evidence a CSF 2.0 Profile reads against. Adoption order is usually ISO 27001 first, CSF 2.0 as the outcome overlay second.
- The NIST SP 800-53 framework page covers the security and privacy controls catalogue used for FISMA and FedRAMP. SP 800-53 is the control catalogue underneath; CSF 2.0 is the outcome framework on top. Federal and federally regulated programmes typically operate both, with SP 800-53 supplying the control selection and CSF 2.0 supplying the leadership communication.
- The SOC 2 framework page covers the AICPA Trust Services Criteria. SOC 2 examinations read against the same underlying control evidence a CSF 2.0 Profile uses; programmes operating SOC 2 already hold most of the GV.PO, GV.OV, and PR-side artefacts CSF 2.0 expects.
- The NIST CSF (1.1) framework page covers the previous CSF revision for organisations that have not yet migrated. Most of the structural concepts (functions, categories, subcategories, Tiers, Profiles) carry forward; the GOVERN function and the C-SCRM relocation are the substantive items that need explicit re-baselining when the migration runs.
- The NIST SSDF implementation guide covers SP 800-218 for software producers. SSDF practices PO, PS, PW, and RV align against CSF 2.0 subcategories under PR (Protect) and ID (Identify), so a software producer evidencing SSDF holds material evidence that reads against the CSF 2.0 Profile for the production posture.
- The CISA Secure by Design framework page covers the principles and pledge for software manufacturers. The Secure by Design executive ownership principle reads directly against CSF 2.0 GV.RR and GV.OV; the published roadmap reads against GV.PO; the Vulnerability Disclosure Policy reads against ID.RA and RS.CO.
- The CIS Controls framework page covers the prioritised defensive actions published by the Center for Internet Security. CIS Controls v8.1 maps across CSF 2.0 functions through the Informative References, and the Implementation Group (IG1, IG2, IG3) selection serves as a useful complement to the CSF 2.0 Tier and Profile decisions.
- The CISA Cybersecurity Performance Goals (CPGs) framework page covers the prioritised, voluntary baseline CISA recommends for critical infrastructure and any organisation with a comparable risk profile. CPGs v2.0 is structured against the same six CSF 2.0 functions (GOVERN, IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER), so the goal-to-subcategory mapping is published rather than improvised; programmes adopt CSF 2.0 as the long-term framework and the CPGs as the prioritised first wave.
- The PCI DSS framework page covers the Payment Card Industry Data Security Standard. PCI DSS requirements read against CSF 2.0 PR (Protect), DE (Detect), and RS (Respond) subcategories; a PCI DSS programme already running v4.0.1 holds material evidence that satisfies the CSF 2.0 Profile entries for in-scope cardholder data environments.
Where SecPortal fits in a CSF 2.0 programme
SecPortal is the operating layer for the CSF 2.0 cycle, not a replacement for the NIST framework or for the underlying control catalogues. The platform handles the Current Profile, the Target Profile, the gap analysis, the action plan, the per-subcategory evidence, and the leadership reporting so the cycle runs as a structured workflow rather than a slide deck refreshed quarterly. The same workspace that hosts the Profile work hosts the SAST, SCA, authenticated DAST, external scanning, and pentest evidence the DETECT and PROTECT functions consume, so the line from artefact to outcome stays traceable.
- Engagement management dedicated to the CSF 2.0 cycle, with phases (GOVERN baseline, Current Profile build, Target Profile build, gap analysis, action-plan execution, re-baseline) tracked as workstreams rather than as one document stitched together at the end
- Findings management with CVSS 3.1 scoring and structured fields so the work tied to PR.AA (access control), PR.DS (data security), DE.CM (continuous monitoring), and RS.MI (incident mitigation) maps back to the subcategory each finding evidences
- Compliance tracking that maps the same evidence pack across CSF 2.0, ISO 27001, SOC 2, NIST SP 800-53, PCI DSS, and Cyber Essentials so the cross-framework footprint reads from a single source
- External, authenticated, and code scanning so the DE.CM continuous monitoring subcategory has a named coverage record across internet-facing infrastructure, authenticated application surface, and source repositories rather than three disconnected tooling silos
- Continuous monitoring with scheduled scans so the cadence DE.CM expects is recorded rather than reconstructed during examination
- AI report generation that turns the engagement evidence and the Profile gap-analysis output into a structured Tier-aligned leadership report and a board-ready summary without manual rewriting
- Activity log that captures every state change to a finding, a Profile entry, or an action-plan item with timestamp and named user, so the trail is reproducible at audit time without a multi-team excavation
- Document management for the Profile artefacts, the policy register, the oversight minutes, the supplier risk inventory, and the post-incident improvement record
The DETECT and RESPOND functions are where most of the day-to-day vulnerability and incident work lives. Findings raised against the DE.CM (continuous monitoring) and DE.AE (adverse event analysis) subcategories need owners, deadlines, and verification evidence that walks back to the subcategory they affect. The remediation tracking workflow keeps that line auditable. The vulnerability prioritisation workflow connects the GOVERN-stated risk tolerance (GV.RM) to the per-finding action the vulnerability management function takes. The vulnerability acceptance and exception management workflow records the documented exceptions GV.RM and GV.PO require. The security leadership reporting workflow carries the GV.OV oversight cadence the new GOVERN function expects.
For internal teams running the programme, the internal security teams workspace bundles the platform with the engagement structure CSF 2.0 expects across the cycle. For the application security function that owns PR.AA, PR.DS, and the per-release authenticated DAST and SAST work the PROTECT function consumes, the AppSec teams workspace covers the same mechanics from the engineering-adjacent angle. For the GRC function that carries the cross-framework evidence pack and the GV.SC supplier risk record, the GRC and compliance teams workspace covers the audit-side discipline that turns the artefacts into a portable evidence pack. For the vulnerability management function that runs the find-track-fix-verify queue feeding DE.CM and RS.MI, the vulnerability management teams workspace covers the lifecycle-layer work the engagement record carries forward.
For security leaders carrying the GV.OV oversight cadence and the GV.RR executive accountability the new GOVERN function expects, the CISOs and security leaders workspace covers the program-level reporting model that sits on top of the CSF 2.0 operating record. For programmes that want continuous detection and trend evidence to feed the DE.CM subcategory between annual Profile re-baselines, the continuous monitoring capability and the code scanning capability produce the cadence and coverage record the function reads against. For analytical context on how vulnerability programmes age across cycles, the vulnerability management programme maturity model research covers the operating discipline that pairs with the CSF 2.0 Tier choice, and the security control drift research covers the erosion patterns that surface when the Current Profile is not refreshed across the cycle.
Key control areas
SecPortal helps you track and manage compliance across these domains.
GOVERN (GV): the new sixth function
NIST CSF 2.0 promotes governance to a first-class function on equal footing with Identify, Protect, Detect, Respond, and Recover. The GOVERN function consolidates and expands the governance practices that were dispersed across CSF 1.1 categories. GV covers Organizational Context (GV.OC), Risk Management Strategy (GV.RM), Roles, Responsibilities, and Authorities (GV.RR), Policy (GV.PO), Oversight (GV.OV), and Cybersecurity Supply Chain Risk Management (GV.SC). The GOVERN function is the place where leadership accountability, executive-level risk tolerance, programme oversight, and supply-chain governance are recorded as evidence rather than asserted in slides.
IDENTIFY (ID): asset, risk, and improvement understanding
CSF 2.0 keeps Identify as the function that develops the understanding the rest of the programme reads against. Categories include Asset Management (ID.AM), Risk Assessment (ID.RA), and Improvement (ID.IM). The Supply Chain Risk Management category that lived under Identify in CSF 1.1 has moved into the new GOVERN function (GV.SC), reflecting that supply-chain risk decisions are governance decisions rather than asset-discovery decisions.
PROTECT (PR): the safeguards that limit incident impact
Protect covers the safeguards that prevent or limit the impact of cybersecurity events. Categories include Identity Management, Authentication, and Access Control (PR.AA), Awareness and Training (PR.AT), Data Security (PR.DS), Platform Security (PR.PS), and Technology Infrastructure Resilience (PR.IR). PR.AA consolidates the access-control and authentication practices that lived in two separate CSF 1.1 categories (PR.AC and PR.IP partially), tightening the function around identity-centric security.
DETECT (DE): continuous monitoring and adverse-event analysis
Detect covers the activities that find cybersecurity events in time to respond. Categories include Continuous Monitoring (DE.CM) and Adverse Event Analysis (DE.AE). CSF 2.0 simplifies the Detect function relative to CSF 1.1, consolidating the legacy detection processes and security continuous monitoring categories around the operating discipline most programmes already run.
RESPOND (RS): incident management, analysis, response, and reporting
Respond covers the activities taken when a cybersecurity event is detected. Categories include Incident Management (RS.MA), Incident Analysis (RS.AN), Incident Response Reporting and Communication (RS.CO), and Incident Mitigation (RS.MI). The CSF 2.0 Respond function tightens the lifecycle vocabulary so the engagement record reads against named subcategories (incident triage, evidence collection, stakeholder notification, mitigation action) rather than free-text narrative.
RECOVER (RC): restoration and improvement after an incident
Recover covers the activities that restore the assets and services impaired by a cybersecurity incident, and that fold the lessons learned back into the programme. Categories include Incident Recovery Plan Execution (RC.RP) and Incident Recovery Communication (RC.CO). Recover is the smallest function by category count, but it is where the programme records that the post-incident state was restored to a known-good baseline and the post-incident improvements landed in the next planning cycle.
Tiers: Partial, Risk Informed, Repeatable, Adaptive
The four Tiers describe the rigour and integration of the cybersecurity risk management practices, not the maturity of any individual control. Tier 1 (Partial) is reactive and ad hoc. Tier 2 (Risk Informed) has management-approved risk awareness without organisation-wide policy. Tier 3 (Repeatable) has formal risk management policy and consistent organisation-wide implementation. Tier 4 (Adaptive) has continuous improvement based on lessons learned and predictive indicators. The Tier choice is a programme decision; CSF 2.0 explicitly notes that not every organisation needs Tier 4, and the right Tier depends on the risk environment.
Profiles: Current Profile, Target Profile, Community Profile
A Profile is the organisation-specific selection of subcategories that the programme runs against, with the Current Profile describing the present state and the Target Profile describing the desired future state. The gap between Current and Target Profile is the planning input. CSF 2.0 also formalises Community Profiles published for sectors (healthcare, public safety) or use cases (small business, election security), so an organisation can adopt a vetted starting point rather than building a Profile from scratch.
Implementation Examples and Informative References
CSF 2.0 ships Implementation Examples beneath each subcategory, naming concrete actions an organisation can take to satisfy the subcategory. Informative References cross-reference each subcategory to NIST SP 800-53, ISO 27001, COBIT, and the wider security-standards corpus. The references make CSF 2.0 a useful overlay for programmes already operating against another standard rather than a competing framework.
Related features
Operate a CSF 2.0 programme on a single defensible record
Hold the Current and Target Profile, the GOVERN-function evidence, the GV.SC supply-chain record, and the cross-function vulnerability and incident artefacts in one workspace. Start free.
No credit card required. Free plan available forever.