Skip to content

NIST Cybersecurity Framework

Implement the NIST CSF for comprehensive cybersecurity with CyberOrigen.

Overview

NIST CSF (Cybersecurity Framework) provides a voluntary framework for managing cybersecurity risk. It's widely adopted across industries and serves as a foundation for many regulations.

Framework Structure

Core Functions

FunctionCodeDescription
IdentifyIDUnderstand your cybersecurity risk
ProtectPRSafeguard critical services
DetectDEIdentify cybersecurity events
RespondRSTake action on incidents
RecoverRCRestore capabilities

Categories

Identify (ID)

  • ID.AM: Asset Management
  • ID.BE: Business Environment
  • ID.GV: Governance
  • ID.RA: Risk Assessment
  • ID.RM: Risk Management Strategy
  • ID.SC: Supply Chain Risk

Protect (PR)

  • PR.AC: Access Control
  • PR.AT: Awareness and Training
  • PR.DS: Data Security
  • PR.IP: Information Protection
  • PR.MA: Maintenance
  • PR.PT: Protective Technology

Detect (DE)

  • DE.AE: Anomalies and Events
  • DE.CM: Continuous Monitoring
  • DE.DP: Detection Processes

Respond (RS)

  • RS.RP: Response Planning
  • RS.CO: Communications
  • RS.AN: Analysis
  • RS.MI: Mitigation
  • RS.IM: Improvements

Recover (RC)

  • RC.RP: Recovery Planning
  • RC.IM: Improvements
  • RC.CO: Communications

Implementation Tiers

TierNameDescription
1PartialAd hoc, reactive
2Risk InformedSome awareness, not organization-wide
3RepeatableFormal policies, organization-wide
4AdaptiveContinuous improvement, predictive

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on NIST CSF
  3. Click Enable

2. Create Current Profile

Assess your current state:

  1. Go to GRCControl Library
  2. Filter by NIST CSF
  3. Rate current implementation
  4. Document gaps

3. Set Target Profile

Define desired state:

  1. Identify business objectives
  2. Set target implementation levels
  3. Prioritize gaps
  4. Create roadmap

Key Subcategories

ID.RA - Risk Assessment

SubcategoryDescriptionCyberOrigen Feature
ID.RA-1Asset vulnerabilities identifiedVulnerability scanning
ID.RA-2Threat intelligence receivedMISP integration
ID.RA-5Threats, vulnerabilities, impacts used for riskRisk register

PR.AC - Access Control

SubcategoryDescriptionCyberOrigen Feature
PR.AC-1Identities managedAccess scanning
PR.AC-3Remote access managedConfiguration checks
PR.AC-4Access permissions managedAccess reviews

DE.CM - Continuous Monitoring

SubcategoryDescriptionCyberOrigen Feature
DE.CM-4Malicious code detectedQuarantine system
DE.CM-8Vulnerability scans performed11-phase scanning

RS.MI - Mitigation

SubcategoryDescriptionCyberOrigen Feature
RS.MI-1Incidents containedRemediation workflow
RS.MI-2Incidents mitigatedAnsible automation
RS.MI-3New vulnerabilities mitigatedFinding management

Control Mapping

NIST CSF maps to other frameworks:

NIST CSFSOC 2ISO 27001PCI-DSS
PR.AC-1CC6.1A.9.1.17.1
PR.DS-1CC6.7A.10.1.13.4
DE.CM-8CC7.1A.12.6.111.2
RS.MI-2CC7.4A.16.1.512.10

Informative References

NIST CSF links to other standards:

ReferenceCoverage
NIST SP 800-53Detailed controls
ISO 27001ISMS requirements
CIS ControlsTechnical controls
COBITIT governance

Profile Development

Industry Profiles

Pre-built profiles for:

  • Financial services
  • Healthcare
  • Energy/utilities
  • Manufacturing
  • Technology

Custom Profiles

Build your own:

  1. Select applicable categories
  2. Set implementation tiers
  3. Add organization-specific controls
  4. Document rationale

Maturity Assessment

Self-Assessment

Rate each subcategory:

LevelDescription
0Not implemented
1Initial/ad hoc
2Developing
3Defined
4Managed
5Optimizing

Gap Analysis

CyberOrigen shows:

  • Current vs target levels
  • Priority gaps
  • Remediation recommendations
  • Progress tracking

Evidence Collection

Automated Evidence

  • Vulnerability scan results
  • Access configuration reports
  • Security monitoring logs
  • Incident response records

Manual Evidence

  • Policies and procedures
  • Training records
  • Risk assessments
  • Business continuity plans

Continuous Improvement

Metrics

Track cybersecurity metrics:

  • Vulnerability closure rate
  • Incident response time
  • Control implementation %
  • Risk reduction over time

Review Cycle

  • Monthly: Metrics review
  • Quarterly: Profile assessment
  • Annually: Full framework review

Common Gaps

CategoryGapSolution
ID.RANo vulnerability scanningImplement scanning
PR.ATNo security trainingTraining program
DE.CMNo monitoringSIEM/monitoring
RS.RPNo incident planIR playbook

Resources

Agentic AI-Powered Security & Compliance