top of page

NIST Releases Version Cybersecurity Framework 2.0

Organizations can enhance their security posture by leveraging the comprehensive approach of the new NIST Cybersecurity Framework 2.0 in conjunction with ISAUnited's security architecture governance guidance, ensuring alignment with industry best practices and effective risk management.

image.png

In response to a presidential Executive Order, NIST initially introduced the Cybersecurity Framework (CSF) in 2014 to aid organizations in comprehending, mitigating, and communicating cybersecurity risks. The framework's foundation now revolves around six fundamental functions: Identify, Protect, Detect, Respond, and Recover, supplemented by the newly incorporated Govern function in CSF 2.0. When amalgamated, these functions offer a holistic perspective on the cybersecurity risk management lifecycle.

​

The "Govern" function within the NIST Cybersecurity Framework (CSF) version 2.0 focuses on establishing the governance structure necessary to ensure effective cybersecurity risk management across an organization. It guides how organizations can develop and implement policies, procedures, and processes to manage and oversee cybersecurity activities.

​

Here are some key components and aspects of the "Govern" function:

​

  • Policy Development: Organizations need to establish cybersecurity policies that align with their business objectives and risk tolerance. These policies should outline the organization's approach to cybersecurity, including roles and responsibilities, risk management processes, and compliance requirements.

  • Risk Management Oversight: Governance involves overseeing the organization's cybersecurity risk management activities. This includes defining risk tolerance levels, identifying and assessing cybersecurity risks, and implementing appropriate risk mitigation strategies.

  • Resource Allocation: Governance involves allocating resources effectively to support cybersecurity initiatives. This includes allocating budget, personnel, and technology resources to address cybersecurity risks and implement security controls.

  • Measurement and Metrics: Governance requires establishing metrics and measurement mechanisms to assess the effectiveness of cybersecurity activities and monitor compliance with policies and procedures. This may involve defining key performance indicators (KPIs) and establishing processes for regular cybersecurity assessments and reporting.

  • Roles and Responsibilities: Clearly defining roles and responsibilities is essential for effective cybersecurity governance. This includes assigning accountability for cybersecurity activities at various levels of the organization and ensuring that individuals understand their roles in managing cybersecurity risks.

  • Compliance and Audit: Governance involves ensuring compliance with applicable laws, regulations, and industry standards related to cybersecurity. This may include conducting regular audits and assessments to verify compliance and identify areas for improvement.

  • Executive Oversight: Executive leadership plays a crucial role in cybersecurity governance by providing strategic direction, support, and oversight. Executives should be actively involved in cybersecurity decision-making and ensure that cybersecurity initiatives align with the organization's overall business objectives.

  • Continuous Improvement: Governance involves establishing processes for continuous improvement of cybersecurity practices. This includes reviewing and updating policies and procedures, identifying lessons learned from cybersecurity incidents, and incorporating feedback from internal and external stakeholders.

 

The updated CSF 2.0, aligned with the National Cybersecurity Strategy, broadens its application beyond safeguarding critical infrastructure, extending its reach to encompass all organizations across various sectors. Introducing a novel emphasis on governance, the framework now addresses how organizations formulate and execute well-informed decisions regarding cybersecurity strategies. The governance aspect of the CSF highlights cybersecurity as a significant enterprise risk, urging senior leadership to prioritize it alongside other critical concerns like financial stability and reputation management.

 

ISAUnited's security architecture governance guidance serves as a cornerstone for security architecture designers and managers, providing invaluable support in navigating the complex landscape of cybersecurity threats and regulatory compliance. By adhering to ISAUnited's guidance, designers can systematically develop robust security architectures that align with organizational objectives while effectively mitigating risks. The guidance offers a structured approach, outlining clear policies, standards, and best practices that inform the design process. Moreover, it delineates roles and responsibilities, empowering managers to allocate resources efficiently and ensure accountability throughout the security architecture lifecycle. With a focus on risk management and compliance, ISAUnited's framework enables designers and managers to proactively identify vulnerabilities, assess their impact, and implement appropriate controls. By fostering collaboration and communication among stakeholders, the guidance facilitates informed decision-making and rapid response to emerging threats. Ultimately, ISAUnited's security architecture governance guidance equips technical designers and managers with the insights needed to build resilient security infrastructures that safeguard organizational assets and uphold stakeholder trust in an increasingly interconnected digital ecosystem.

 

Learn more about ISAUnited’s stance on architecture governance here: https://www.isaunited.org/security-architecture-governance

Business Meeting

Join ISAUnited for the professional support and growth that you won't find anywhere else

ISAUnited gives you the best professional and technical resources.

bottom of page