Dark
Light

Explore NIST cybersecurity framework 20 unpacked to enhance security

1 min read
101 views

TLDR:

  • The NIST cybersecurity framework 2.0 was released in February 2024, building upon previous versions to enhance risk management using common language that focuses on business drivers.
  • New additions in NIST 2.0 include the Govern function, expanded best practices, and a focus on organizational and community profiles.

In the article “Unpacking the NIST cybersecurity framework 2.0,” Doug Bonderud discusses the key elements of the new framework and how organizations can effectively apply it to their daily operations.

Key Elements:

The journey to CSF 2.0 began with a request for information (RFI) in February 2022, and over the next two years, NIST engaged the cybersecurity community to refine existing standards and create a new model that reflects evolving security challenges.

The introduction of the “Govern” function underpins all five functions of the original NIST framework: Identify, Protect, Detect, Respond, and Recover, focusing on aligning security with business needs and leadership involvement.

CSF 2.0 offers expanded best practices applicable to businesses of any size, recommending organizational and community profiles to set cybersecurity goals and address shared interests and threats.

To effectively implement CSF 2.0, organizations are advised to use available recommendations and resources, involve leaders in the process, evaluate external partnerships for vendor and supplier management, and deploy management and monitoring tools for threat detection and risk reduction.

Summary:

The NIST cybersecurity framework 2.0 builds upon previous versions to enhance risk management using common language that focuses on business drivers. The introduction of the “Govern” function, expanded best practices, and a focus on organizational and community profiles are key elements of the new framework. Organizations are advised to follow a four-pronged approach to effectively implement CSF 2.0, including using available resources, involving leaders in the process, evaluating external partnerships, and deploying management and monitoring tools for threat detection and risk reduction.

Previous Story

Cyber attack causes 911 service outage for millions of people

Next Story

Over 500,000 Roku accounts hacked in another cybersecurity breach

Latest from News