Skip to main content

Posts

NIST CSF 2.0 – Protect Function Deep Dive: Data Security (PR.DS)

Recent posts

NIST CSF 2.0 – Protect Function Deep Dive: Awareness and Training (PR.AT)

Most organizations don’t fail at cybersecurity because they lack tools. They fail because people do the reasonable thing in an unreasonable situation : Clicking a convincing link Reusing a password to get work done Sharing files the fastest way, not the safest Bypassing controls that slow them down PR.AT exists because humans are not the weakest link—they are the most influential one . NIST CSF 2.0 explicitly recognizes that cybersecurity awareness and training are not “nice-to-have” activities. They are protective controls that reduce risk every single day. Where PR.AT Fits in the Protect Function So far, Protect has focused on structural controls : PR.AA ensures only the right identities have access Controls, permissions, and authentication enforce boundaries PR.AT addresses something different: How people think, decide, and behave when controls are present—or when they fail. No control operates in isolation. People configure it. People use it. People override it. PR.AT is the layer...

NIST CSF 2.0 – Protect Function Deep Dive: Identity, Authentication, and Access Control (PR.AA)

If you strip most cyber incidents down to their root cause, you will usually find the same failure: Someone—or something—had access they should not have had. It might be: A compromised employee account An administrator with too much privilege A service account that was never rotated A vendor account that was never removed Tools fail. Controls misfire. Alerts get missed. But identity and access failures quietly bypass them all . That is why PR.AA – Identity Management, Authentication, and Access Control is the first category in the NIST CSF 2.0 Protect function. It represents the moment where cybersecurity stops being abstract planning and starts becoming real enforcement . How PR.AA Fits Into the Big Picture Up to this point, the Identify function helped answer: What assets exist? (ID.AM) What risks matter most? (ID.RA) How do we learn and improve over time? (ID.IM) The Protect function answers the next logical question: “Now that we know what matters—how do we stop bad things fro...

NIST CSF 2.0 – Identify Function Deep Dive: Improvement (ID.IM)

Most cybersecurity programs don’t fail because they lack controls. They fail because they fail to learn . Incidents happen. Audits surface gaps. Assessments reveal weaknesses. Yet many organizations treat these moments as interruptions instead of inputs . That is exactly why Improvement (ID.IM) exists in the NIST Cybersecurity Framework (CSF) 2.0 Identify function. ID.IM ensures the organization systematically learns from experience and uses that learning to strengthen governance, risk management, and strategic execution. In CSF 2.0, improvement is no longer implied—it is explicit, measurable, and expected . This post covers: What ID.IM is in NIST CSF 2.0 How mature organizations operationalize continuous improvement Metrics that demonstrate learning, not just activity What Is NIST CSF 2.0 Improvement (ID.IM)? ID.IM focuses on identifying opportunities for improvement in cybersecurity governance, risk management, and controls based on: Incidents and near misses Risk assessments Aud...

NIST CSF 2.0 – Identify Function Deep Dive: Risk Assessment (ID.RA)

If Asset Management answers “What do we have?” , Risk Assessment answers the more important question: “What could realistically go wrong, and what actually matters?” In NIST CSF 2.0, Risk Assessment (ID.RA) is no longer a compliance checkbox or an annual spreadsheet exercise. It is positioned as a living, decision-support capability that informs governance, investment prioritization, and executive accountability. Most organizations do risk assessments. Very few organizations use them effectively . This post explains: What ID.RA is in NIST CSF 2.0 How to implement it in a way executives trust Metrics that demonstrate risk maturity—not paperwork completion What Is NIST CSF 2.0 Risk Assessment (ID.RA)? ID.RA focuses on identifying and evaluating cybersecurity risk to organizational operations, assets, individuals, and stakeholders . In CSF 2.0, Risk Assessment explicitly includes: Threats (internal, external, supply chain, systemic) Vulnerabilities (technical, process, human) Likelih...

NIST CSF 2.0 – Identify Function Deep Dive: Asset Management (ID.AM)

If you ask most CISOs where breaches really start, the answer is rarely “lack of tools.” It’s almost always lack of clarity . You cannot protect what you do not know exists. That is why Asset Management (ID.AM) sits at the foundation of the NIST Cybersecurity Framework (CSF) 2.0 Identify function. Every control, risk decision, investment, and response capability depends on accurate, current, and business-aligned asset visibility. In NIST CSF 2.0, Asset Management is no longer treated as an inventory exercise—it is framed as a risk-enabling capability that supports governance, threat modeling, resilience, and mission outcomes. This post breaks down: What ID.AM actually is in CSF 2.0 How to implement it pragmatically in a real enterprise Metrics CISOs and boards can use to measure effectiveness (not just activity) What Is NIST CSF 2.0 Asset Management (ID.AM)? ID.AM ensures that organizational assets—physical, digital, cloud-based, third-party, and data-centric—are identified, mana...

Cybersecurity Governance That Works: A Board and Executive Guide to the NIST CSF 2.0 GOVERN Function

Cybersecurity has permanently moved out of the data center and into the boardroom. Regulators, customers, and investors now expect senior leadership to understand, oversee, and deliberately manage cyber risk . The NIST Cybersecurity Framework 2.0 reflects this reality by elevating GOVERN to a first-class function—placing leadership accountability at the center of cybersecurity. This post ties together the full GOVERN function , explaining what boards and executives need to know—and what questions they should be asking. Why GOVERN Exists The GOVERN function addresses a fundamental challenge: Cybersecurity failures are rarely caused by missing tools. They are caused by unclear ownership, misaligned priorities, and unmanaged risk decisions. GOVERN ensures cybersecurity is treated as: An enterprise risk issue A leadership responsibility A business decision , not just a technical one When GOVERN is strong, organizations make fewer surprises and better tradeoffs. When it is weak, executives...