NIST Cybersecurity Framework 2.0: Governance, Maturity and Practical Implementation

Updated on: 16 April 2026 · 9 min read

The NIST Cybersecurity Framework 2.0 expands its scope to all organisations and introduces Governance as the sixth core function – your practical guide.

Contents

  1. What is NIST?
  2. NIST 1.1 vs. 2.0
  3. 6 Core Functions
  4. Implementing NIST 2.0
  5. Measuring the Maturity Levels
  6. Certification
  7. NIST 2.0 vs. ISO 27001

Overview: NIST 2.0

  • The NIST Cybersecurity Framework 2.0 introduces Govern as the sixth core function and strengthens governance aspects
  • NIST CSF 2.0 is aimed at all organisations – not just critical infrastructures
  • Awareness training and phishing simulations meet key Protect and Detect requirements
  • Implementation Tiers from Partial to Adaptive enable maturity measurement
  • NIST Cybersecurity Framework 2.0 and ISO 27001 are ideal complements as Enterprise Security Frameworks for technical and certifiable security

The NIST Cybersecurity Framework gives organisations structured, flexible guidance for security risk management. The NIST CSF integrates cyber risks into the enterprise risk management strategy and prioritises measures according to the individual risk profile. It creates a common language between technical staff, management and stakeholders.

NIST CSF 2.0 was released on 26 February 2024 – the first fundamental revision of the NIST Cybersecurity Framework since 2014. The new version, NIST 2.0, expands the scope to all organisations and introduces the sixth core function, “Govern”. In this way, the NIST Cybersecurity Framework responds to changing threats and stronger governance requirements.

You implement the NIST Cybersecurity Framework via a Current Profile (as-is state) and a Target Profile (to-be state). The gap analysis identifies areas for action in NIST CSF 2.0, which you document in a prioritised Action Plan with responsibilities and deadlines. When you implement NIST 2.0, you measure the degree of implementation across four Implementation Tiers from Partial to Adaptive – continuous improvement included.

The 6 core elements of the NIST Cybersecurity Framework are Govern, Identify, Protect, Detect, Respond and Recover. Govern lays the strategic foundation for risk management in NIST CSF 2.0, while Identify captures your assets and their associated risks. Protect deals with specific protective measures, and Detect tracks down anomalies. Respond governs how you react to incidents, and Recover gets your systems back up and running after an incident.

To meet NIST requirements for Human Risk Management, you need three main things: continuous cyber security awareness training, realistic phishing simulations, and a Human Risk Management platform. This allows you to cover several functions of the NIST Cybersecurity Framework 2.0 at once – Protect through Awareness and Training, Detect through behavioural monitoring, and Govern through measurable risk dashboards. Adaptive training concepts go one step further: They adapt content to the individual risk levels of your employees and bring you closer to Tier 4 “Adaptive” of NIST CSF 2.0.

What is NIST?

The National Institute of Standards and Technology (NIST) is a non-regulatory research agency of the U.S. Department of Commerce. What NIST develops – from atomic clocks and encryption standards to cyber security guidelines – serves as a global reference. The National Vulnerability Database (NVD) records security vulnerabilities based on the Security Content Automation Protocol (SCAP). For companies, this means they can keep track of vulnerabilities and automate large parts of the monitoring process.

The SP 800-207 guideline defines the NIST Zero Trust Architecture – and it has fundamentally revolutionised security concepts. The principle behind it: “Never trust, always verify”. Instead of relying on a one-time login, it constantly verifies who is accessing what. Identity Management is at its core, combined with strict access rules and seamless monitoring.

In 2014, the NIST Cybersecurity Framework was created following a presidential Executive Order to protect critical infrastructures. On 26 February 2024, NIST 2.0 was released – the most significant revision in ten years. The scope was massively expanded, and a completely new governance function, Govern, was added.

NIST CSF 1.1 vs. 2.0: The most important changes

From NIST CSF 1.1 to NIST CSF 2.0, a lot has changed both structurally and in terms of content. The NIST Cybersecurity Framework has become more future-proof and practical:

Key Changes in NIST CSF 2.0

  • Sixth Core Function “Govern”: What was distributed across all functions in NIST CSF 1.1 is now bundled centrally in NIST 2.0 – governance is now at the centre
  • Expanded target audience: The NIST Cybersecurity Framework 2.0 no longer addresses only critical infrastructures, but all organisations from non-profits to large corporations
  • Supply Chain Risk Management: Supplier relationships, risk prioritisation and contractual security requirements are brought sharply into focus
  • Secure Software Development: DevSecOps and Software Supply Chain Security are given significantly more weight in NIST 2.0
  • Simplified language: Security Controls are described in a more understandable and practical way in the NIST Cybersecurity Framework 2.0
  • Better integration: NIST CSF 2.0 harmonises seamlessly with NIST SP 800-161 (Cybersecurity Supply Chain) and SP 800-218 (Secure Software Development)

The visual difference is immediately noticeable: NIST CSF 1.1 showed five functions in a cycle on the same level. In NIST 2.0, Govern is central and influences all other functions.

The 6 Core Functions of the NIST Cybersecurity Framework 2.0

Govern (GV)

Governance creates the strategic foundation for the entire cyber security risk management process in the NIST Cybersecurity Framework 2.0. This includes the risk management strategy, role definitions, responsibilities and monitoring of the security strategy. Crucially: Cyber security is integrated into the Enterprise Risk Management (ERM) strategy – cyber risks are on a par with financial and operational risks. The Human Risk Management platform quantifies human risks and supports data-based management decisions.

Identify (ID)

Before you can manage risks in NIST 2.0, you need to know which assets exist. Data, hardware, software, systems, employees, suppliers – and their associated risks. This function lays the foundation for risk-based prioritisation, consistent with the Govern strategy of the NIST Cybersecurity Framework. Cyber security awareness training makes employees aware of threats and helps with asset and risk identification.

Protect (PR)

Protective measures in NIST CSF 2.0 reduce the likelihood and impact of negative security events. Identity Management, Authentication, Access Control, Data Security, Platform Security – the list is long. Awareness training is indispensable in this function of the NIST Cybersecurity Framework 2.0 – it turns employees into the strongest line of defence against social engineering. In addition, there is the resilience of the tech infrastructure that keeps your critical business processes running.

Detect (DE)

There is no such thing as one hundred percent security, even with the best protective measures. This is precisely why the Detect function of NIST 2.0 is needed: It detects anomalies, indicators of compromise and potential threats in a timely manner. With continuous monitoring and Adverse Event Analysis, you lay the foundation for successful Incident Response in the NIST Cybersecurity Framework. Phishing simulations realistically test the vigilance of your teams and reveal weaknesses.

Respond (RS)

As soon as an incident is detected, the Respond function of NIST CSF 2.0 comes into play. It governs how you specifically handle incidents: from the first management step, through analysis and damage limitation, to reporting and communication. That’s why you need to clearly define in advance who needs to be informed internally and externally about which incidents – this includes stakeholders as well as public authorities. The faster your teams react and the closer the collaboration, the lower the impact.

Recover (RC)

After an incident, the focus is on recovery. The Recover function of the NIST Cybersecurity Framework 2.0 includes Incident Recovery Plan Execution and Incident Recovery Communication. Plan and test recovery in parallel with response – this is the only way to be able to act in an emergency. Goal: minimal impact and a quick return to normal operation.

Awareness training for NIST 2.0

Start awareness training

Train your teams in a measurable way and meet NIST requirements.

Implementing NIST 2.0: Step-by-step to adaptive cyber security risk management

The implementation of the NIST Cybersecurity Framework 2.0 follows four clear steps:

Step 1: Conduct a status quo analysis

Create a Current Profile that maps your current security status in NIST CSF 2.0. Which outcomes of the six Core Functions of the NIST Cybersecurity Framework have you already achieved? Which controls are implemented, and where are the gaps? This stocktake is the basis for everything that follows in NIST 2.0.

Step 2: Define a Target Profile

The Target Profile defines your desired outcomes – aligned with the strategic goals and risk management requirements of the NIST Cybersecurity Framework 2.0. Take into account the risk appetite and risk tolerance thresholds from Govern. This way you know where your organisation should be in the medium term.

Step 3: Prioritise measures

The gap analysis between the Current and Target Profiles shows specific areas for action in NIST 2.0. Prioritise according to risk impact, available resources and feasibility. Document this as a Risk Register, Risk Detail Report or Plan of Action and Milestones (POA&M).

Step 4: Create a roadmap with clear responsibilities

Your Action Plan needs defined responsibilities, resources, milestones and deadlines for the NIST implementation. Each measure is assigned a responsible person, and a monitoring system continuously tracks progress. Update the Current Profile regularly after implementation and adjust the Target Profile if necessary.

Implementation Tiers: The path to Adaptive Security

NIST CSF 2.0 distinguishes four maturity levels:

Tier 1 – Partial: Security processes in the NIST Cybersecurity Framework? Ad hoc or minimal. Your risk management is reactive, your organisation is not prepared for attacks.

Tier 2 – Risk-Informed: Security policies exist, but the implementation of NIST 2.0 is not yet complete in your company. You know the risks in theory, but (so far) you have no consistent assessment method.

Tier 3 – Repeatable: The security practices of NIST CSF 2.0 are firmly anchored in your organisation. They are documented and regularly reviewed. Both risk management and data security follow clear, standardised procedures in your company.

Tier 4 – Adaptive: Security in the NIST Cybersecurity Framework 2.0 permeates your  entire organisation, is continuously monitored and reacts flexibly to new threats. You don’t just carry out risk assessments when necessary, but permanently – and cyber risks are given the same priority as financial or operational risks.

Adaptive cyber security means that your security measures evolve with the threat landscape. Modern Human Risk platforms provide real-time data on the behaviour and risk level of your employees – so you can manage measures dynamically.

Achieve adaptive security

View awareness training

From Tier 1 to Tier 4 with measurable and continuous SoSafe training.

How to measure the NIST CSF 2.0 Maturity Levels

NIST CSF 2.0 makes cyber security maturity measurable – through Profiles and Implementation Tiers. Current Profiles show the as-is state, Target Profiles the to-be state in relation to the Core Outcomes of the NIST Cybersecurity Framework. From Partial to Adaptive, the four tiers in NIST 2.0 risk management become increasingly sophisticated and stricter.

How do organisations assess their maturity in NIST CSF 2.0? With Key Performance Indicators (KPIs) that show how well controls are working, for example patch speed, the success rate of phishing simulations or the average response time to incidents. In addition, there are Key Risk Indicators (KRIs), which make risks visible at an early stage. Discuss these figures regularly with your executives – after all, good decisions need a reliable data basis.When should you aim for a higher tier in the NIST Cybersecurity Framework? When your risk situation worsens, regulatory requirements force you to, or the cost-benefit analysis is right.

However, the long-term goal remains Tier 4 \”Adaptive\” in NIST 2.0: Security that grows with the threat landscape and makes your organisation permanently more resilient. What does that mean in concrete terms? Adaptive organisations constantly keep an eye on their systems, regularly update their policies with best practices and integrate security data into all areas of the company. A measurable level of maturity shows CISOs the ROI of their investments in the NIST Cybersecurity Framework – budgets can thus be justified on a data-driven basis.

Certification: How NIST CSF certification works

Unlike ISO 27001, the NIST Cybersecurity Framework does not require formal certification or external audits. The NIST CSF is voluntary, a guide for individual adaptation. NIST itself does not issue certificates to organisations.

However, third-party providers do offer certifications for professionals who implement or advise on NIST CSF 2.0. \”NIST CSF 2.0 Lead Implementer\”, for example, qualifies individuals to develop, implement and manage security programmes according to the NIST Cybersecurity Framework. Such certificates confirm individual competence – not an organisation’s compliance with NIST 2.0.

You can use the NIST CSF freely without ever undergoing an audit. You document the implementation of the NIST Cybersecurity Framework 2.0 via self-assessment, maturity tiers and organisational profiles – formal proof is optional, unless contracts or regulations explicitly require it.

NIST Cybersecurity Framework vs. ISO 27001: Differences and synergies

The NIST Cybersecurity Framework and ISO 27001 pursue the same goal, namely managing security risks, but they go about it in different ways.

CriterionNIST CSF 2.0ISO 27001
TypeFlexible framework, guidancePrescriptive standard, ISMS
CertificationNo official certification Formal certification by accredited bodies 
CostsAvailable free of charge Audit and certification fees ​
ApproachOutcome-oriented, flexibly adaptable Requirements-based, mandatory requirements 
Proof of ComplianceSelf-assessment, Profiles, Tiers External audits, certificate 
International RecognitionPrimarily USA, increasingly global Globally recognised 

The two standards complement each other perfectly. Many organisations use NIST CSF 2.0 to build a technical basis and then formalise these controls with ISO 27001 to create a certifiable management system. Common principles: risk-based approach, senior management support, continuous improvement.

CISOs benefit from both: The NIST Cybersecurity Framework for flexible control implementation and risk communication at the executive level, ISO 27001 for formal certification, international recognition and a structured ISMS. Many map NIST 2.0 controls to ISO 27001 requirements – so you can serve both standards efficiently.

Note: This article does not constitute legal advice. It is for general information purposes only and does not replace an individual legal review. For binding information on NIST CSF 2.0, please contact qualified legal advisors or the relevant authorities.

Experience our products first-hand

Use our online test environment to see how our platform can help you empower your team to continuously avert cyber threats and keep your organization secure.

The Forrester Wave™ Strong Performer 2024: Human Risk Management Solutions

This page is not available in English yet.

Diese Seite ist noch nicht in Ihrer Sprache verfügbar. Sie können auf Englisch fortfahren oder zur deutschen Startseite zurückkehren.

Cette page n’est pas encore disponible dans votre langue. Vous pouvez continuer en anglais ou revenir à la page d’accueil en français.

Deze pagina is nog niet beschikbaar in uw taal. U kunt doorgaan in het Engels of terugkeren naar de Nederlandse startpagina.

Esta página aún no está disponible en español. Puedes continuar en inglés o volver a la página de inicio en español.

Questa pagina non è ancora disponibile nella tua lingua. Puoi continuare in inglese oppure tornare alla home page in italiano.