Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Major Changes in NIST Cybersecurity Framework 2.0: Enhancements and Adoption Strategies

    Major Changes in NIST Cybersecurity Framework 2.0: Enhancements and Adoption Strategies

    May 9, 2024

    The NIST Cybersecurity Framework (CSF) is a framework designed to provide cybersecurity risk-management guidance to private and public industries, government agencies, and other organizations . It is intended to be applicable for use by any organization regardless of it’s size or scale, age, or sector.

    The version 2.0 of the cybersecurity framework is much more extensive with its core guidance and lists additional subcategories as well as links to online resources that offer further guidance on practices to achieve these objectives. The guidance is divided into six areas of focus: identify, protect, detect, respond, recover, and govern.

    This article unravels the NIST Cybersecurity Framework, the major changes outlined in CSF 2.0, and some of the ways in which it can be adopted.

    The NIST Cybersecurity Framework

    Overview

    The NIST Cybersecurity Framework (NIST CSF) was first introduced in 2014 by the National Institute of Standards and Technology to bolster the security of infrastructure within the United States. By establishing a common set of standards, goals, and terminology to reduce the risk and impact of cyberattacks.

    By promoting the shared framework, the NIST CSF aids in better decision-making and encourages security standards to address threats such as phishing and ransomware.

    The initial version was updated to Version 1.1 in 2018, adopting major changes such the inclusion of the Identify core function, additional sub-categories and improved clarity. The draft copy for version 2.0 of the framework was released with the intention of receiving public feedback in August 2023 and closed for comments in November 2023, the final release of Version 2.0 was released in February 2024.

    Since the new framework demonstrates increased flexibility to various situations, the NIST has recommended its voluntary self-adoption by organizations of all sizes.

    Target Audience

    The primary audience for the framework comprises of individuals responsible for developing and overseeing cybersecurity planning and strategization within organizations.

    It is also relevant for other roles involved in risk management, such as executives, board of directors, acquisition professionals, technology experts, risk managers, legal professionals, human resource specialists, and auditors who specialize in cybersecurity and risk management.

    Additionally, the CSF can serve as a useful asset to those involved with the making and influencing of private and public policy (e.g., associations, professional organizations, regulators) who establish and communicate priorities for cybersecurity risk management.

    Major Changes in NIST Cybersecurity Framework 2.0

    Released in February 2024, the NIST Cybersecurity Framework 2.0 is the latest revision to the framework.

    Inclusion of ‘Govern’ Core Function

    While the previous framework stated ‘Identify, Protect, Detect, Respond, and Recover’ as its core functions in implementation, the new framework includes ‘Govern.’

    Govern seeks to addresses the establishment of cybersecurity strategy, cybersecurity supply chain risk
    management, roles, responsibilities, authorities, policy, and the oversight of cybersecurity strategy within the  organizational context.

    More Extensive Sub-categories and References within Core Functions

    CSF version 2.0 includes additional categories and subcategories of cybersecurity goals and standards within the listed core functions, as well as hundreds of other helpful references to assist readers. The new framework is much more extensive with its definitions and resources.

    Expanded Scope

    The new framework’s scope has expanded beyond just the protection of critical infrastructure, such as water facilities and power plants, to providing safety standards for all organizations regardless of sector or size.

    This expanded scope is reflected in the change of the CSF’s official title to “The Cybersecurity Framework,” from the earlier “Framework for Improving Critical Infrastructure Cybersecurity.”

    This reflects an earlier request from the US Congress for the framework to expand its guidance to aid small businesses.

    Framework Tiers

    The new tiers define how a company handles cybersecurity risks, allowing them to adopt the tier that best fulfills their objectives, decrease cyber risk to a desirable level while accounting for difficulties in implementation.

    The tiers offer progress starting from 1 (‘Partial’) to 4  (‘Adaptive’) with rising level of sophistication but additional efforts in implementation.

    Framework Profiles

    The CSF profiles aid companies in finding the right path that’s right for them to reduce cybersecurity risks. Each profile lays out an organization’s “current” and “target” positions and in meeting the criteria in transforming from one profile to the other.

    Focus on Supply-Chain and  Third-Party Risk

    The framework incorporates new supply chain guidelines as part of the core ‘Govern’ function, and expects that cybersecurity risks within software supply chains should be considered while an organization carries out its functions.

    Moreover, the NIST framework reminds organizations to plan and conduct due diligence to reduce risks prior to entering agreements with supplier or other third-party contractors.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUK-Based Digital Signing Platform SigningHub Faces Alleged Source Code Leak
    Next Article Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Implementing tenant isolation using Agents for Amazon Bedrock in a multi-tenant environment

    Development

    Comparative Evaluation of SAM2 and SAM1 for 2D and 3D Medical Image Segmentation: Performance Insights and Transfer Learning Potential

    Development

    Rilasciato Tor Browser 14.5: Miglioramenti per Privacy e Usabilità su GNU/Linux e Android

    Linux

    Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

    Development

    Highlights

    Linux

    Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 4/2025

    January 26, 2025

    Ogni settimana, il mondo del software libero e open source ci propone una serie di…

    This great cordless vacuum is just $47 with this 4th of July deal

    July 1, 2024

    Top Calendar Tools For Meetings (2024)

    August 9, 2024

    Linux kernel 6.14 is a big leap forward in performance and Windows compatibility

    March 26, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.