International StandardVoluntary (widely adopted reference)· CSF 2.0 (February 2024)

NIST CSF: NIST Cybersecurity Framework

NIST Cybersecurity Framework 2.0 — issued by National Institute of Standards and Technology, U.S. Department of Commerce.

Speak to a NIST CSF SpecialistExplore the Compliance Platform
Latest version
NIST CSF 2.0 (released February 2024)
Core functions
6 — Govern, Identify, Protect, Detect, Respond, Recover
Categories
23 categories, 108 subcategories
Originally
Created for U.S. critical infrastructure (2014)
Now used by
Organisations of all sizes globally
Cost
Free — public domain
OVERVIEW

What is NIST CSF?

The NIST Cybersecurity Framework (CSF) is a voluntary, risk-based framework originally developed for U.S. critical infrastructure operators in 2014 and now widely adopted as a global reference standard. Version 2.0, released February 2024, expanded the framework's audience from critical infrastructure to organisations of all sizes and sectors, and introduced a new sixth Core function — Govern — alongside the original five (Identify, Protect, Detect, Respond, Recover).

CSF 2.0 organises cybersecurity outcomes into 23 categories and 108 subcategories, each describing a desired outcome in plain language rather than prescribing specific controls. This outcome-based approach makes CSF a useful translation layer between technical control libraries (ISO 27001, NIA, CIS Controls) and executive-level cybersecurity governance discussions.

While CSF is voluntary, it has become a de facto baseline for cybersecurity programmes globally and is frequently referenced in tender requirements, board governance frameworks, and supplier risk assessments. Many Qatar organisations use CSF as their executive-facing reporting framework while implementing NIA or ISO 27001 controls operationally.

APPLICABILITY

Who must comply with NIST CSF?

  • 01Organisations seeking a globally recognised, outcome-based cybersecurity reference framework
  • 02Boards and executive teams needing a common language for cybersecurity governance
  • 03Suppliers responding to RFPs that reference NIST CSF
  • 04Critical infrastructure operators (originally CSF's primary audience)
  • 05Organisations consolidating multiple framework obligations into a single reporting view
CONTROL DOMAINS

NIST CSF structure at a glance

The NIST CSF framework is organised into the following control areas. Vantage GRC pre-maps each one so evidence collected once contributes to your compliance picture across overlapping frameworks.

GOVERN (NEW in 2.0)

Organisational context
Risk management strategy
Roles, responsibilities, and authorities
Policy
Oversight
Cybersecurity supply chain risk management

IDENTIFY

Asset management
Risk assessment
Improvement

PROTECT

Identity management, authentication, and access control
Awareness and training
Data security
Platform security
Technology infrastructure resilience

DETECT

Continuous monitoring
Adverse event analysis

RESPOND

Incident management
Incident analysis
Incident response reporting and communication
Incident mitigation

RECOVER

Incident recovery plan execution
Incident recovery communication
KEY REQUIREMENTS

What NIST CSF requires you to do

  1. 1Establish a Target Profile of desired CSF outcomes appropriate to your organisation's mission and risk tolerance.
  2. 2Assess Current Profile against Target to identify gaps.
  3. 3Prioritise gap closure based on risk and resource availability.
  4. 4Implement controls (drawn from CIS, ISO 27001, or sector-specific frameworks) to achieve target outcomes.
  5. 5Monitor and measure progress through CSF Tiers (Partial / Risk Informed / Repeatable / Adaptive).
  6. 6Communicate cybersecurity posture to leadership using CSF outcome categories.
HOW VANTAGE HELPS

Vantage's approach to NIST CSF

Vantage GRC supports CSF 2.0 as a reporting overlay — your operational controls (mapped to NIA, ISO 27001, etc.) automatically populate the corresponding CSF outcome categories. This gives executives and the board a single CSF-aligned view of cybersecurity posture without requiring a separate control library to be implemented and evidenced.

Book a 30-Min ConsultationExplore the Platform
RELATED FRAMEWORKS

NIST CSF works alongside

FAQ

NIST CSF questions

What's new in NIST CSF 2.0 vs the original framework?

CSF 2.0 introduces a sixth Core function — Govern — explicitly elevating cybersecurity governance, supply chain risk management, and roles/responsibilities. It also expands the audience from U.S. critical infrastructure to organisations of all sizes globally, and adds a new Implementation Examples resource alongside existing Profiles and Tiers.

How does NIST CSF differ from ISO 27001?

CSF is outcome-based and voluntary; ISO 27001 is control-based and certifiable. CSF describes what should be achieved (e.g. 'Identities and credentials are managed for authorised devices and users'); ISO 27001 specifies controls to be implemented and evidenced. The two are complementary — most mature programmes use ISO 27001 for operational implementation and CSF for executive reporting.

Is NIST CSF certification available?

No — there is no formal certification programme for CSF. Organisations self-assess against the framework or undergo voluntary third-party assessments, but there is no equivalent of an ISO 27001 certificate.

Ready to operationalise NIST CSF compliance?

Talk to a Vantage GRC consultant about your NIST CSF programme — pre-mapped controls, evidence management, and audit-ready dashboards. Doha-based.

Book a ConsultationExplore the Platform