NIST Cybersecurity Framework v2.0
Best for: Federal contractors and agencies must align under Executive Order 13800. Critical infrastructure operators (energy, healthcare, financial services, water) encounter it through sector regulations that reference CSF directly. Cyber insurers increasingly require maturity tier assessments during underwriting. Organizations already mapped to NIST 800-53 or ISO 27001 use CSF v2 for board-level reporting. No revenue or size threshold; the framework applies from small businesses to multinationals.
๐ National Institute of Standards and Technology (NIST), U.S. Department of Commerce ยท NIST CSF v2.0 (Feb 2024) Official source โ
Get Started
module "..." {
source = "nistcsf.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}
What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Certificate and Key Management: Five controls cover ACM certificate status (expiration within 30 days, failed state, pending validation), RSA key length (minimum 2048 bits), and certificate transparency logging. These map directly to PR.DS-01 and PR.DS-02.
- API Authorization and Access Control: Validates that API Gateway v1 and v2 routes and methods have authorization types configured and that authorizers (Lambda, Cognito, IAM) are attached. Four controls in total, mapping to PR.AA-01 through PR.AA-05.
- Encryption at Rest: Checks Athena workgroup encryption configuration. The full benchmark includes additional controls for S3, EBS, RDS, and other storage services, building a broader encryption-at-rest posture under PR.DS-01.
- Infrastructure Resilience: Three controls verify that Auto Scaling groups span multiple AZs, use capacity rebalancing, and attach ELB health checks. Maps to RC.RP-01 and PR.IR-01.
- Audit Logging and Monitoring: Confirms API Gateway stage logging and AppSync field-level logging are enabled. Maps to DE.CM-01 and DE.CM-09 for continuous monitoring of network and application activity.
- Account Governance: Checks that the AWS account belongs to an AWS Organizations structure. Maps to GV.OC-01 and GV.SC-01 for organizational context and supply chain governance.
What you handle
- Certificate and Key Management: Defining and documenting your certificate lifecycle policy, setting up automated renewal workflows, and managing any private CA hierarchies outside ACM.
- API Authorization and Access Control: Designing authorization logic within Lambda authorizers or Cognito user pool policies, reviewing least-privilege scopes and token expiration settings, and maintaining periodic user access reviews.
- Encryption at Rest: Selecting and managing KMS keys (CMK vs. AWS-managed), defining key rotation schedules, and documenting data classification policies that determine which data requires encryption.
- Infrastructure Resilience: Writing and testing recovery runbooks, defining RTO/RPO targets, conducting tabletop exercises, and documenting business continuity plans that go beyond infrastructure configuration.
- Audit Logging and Monitoring: Log retention periods, alerting thresholds in your SIEM, incident escalation workflows, and cross-service log correlation for threat detection.
- Account Governance: Defining and enforcing Service Control Policies (SCPs), establishing an organizational unit hierarchy, and documenting governance roles and responsibilities per the Govern function requirements.
Controls by Category
Data Protection and Encryption (PR.DS) (3 controls)
Expired or failed ACM certificates are an immediate flag; they indicate broken TLS in production. RSA keys below 2048 bits fail the minimum key length requirement under PR.DS-02. Certificate transparency logging gives auditors a verifiable record of issued certificates when they are validating PR.DS-01 and PR.DS-02 evidence.
Identity and Access Management (PR.AA) (3 controls)
The most common finding in this category is API Gateway methods left at authorization type NONE after a development stage gets promoted to production. Assessors want configuration exports showing the authorizer type (Cognito, Lambda, IAM) per route, and they will probe endpoints directly if the documentation looks incomplete.
Logging and Continuous Monitoring (DE.CM) (2 controls)
DE.CM calls for continuous monitoring of events that could indicate a cybersecurity incident. API Gateway stages need both execution and access logging flowing to a centralized destination with defined retention. AppSync field-level logging is the mechanism assessors look for when evaluating detection coverage for unauthorized GraphQL query patterns.
Additional Controls (125)
AWS Backup (1)
AWS CloudTrail (4)
AWS CodeBuild (2)
AWS Database Migration Service (3)
AWS IAM (1)
AWS KMS (1)
AWS Lambda (1)
AWS Systems Manager (1)
Amazon CloudFront (3)
Amazon CloudWatch (3)
Amazon CloudWatch Logs (1)
Amazon DocumentDB (1)
Amazon DynamoDB (4)
Amazon EBS (3)
Amazon EC2 (5)
Amazon ECR (2)
Amazon ECS (1)
Amazon EFS (2)
Amazon ElastiCache (4)
Amazon Kinesis (3)
Amazon MSK (1)
Amazon Neptune (5)
Amazon OpenSearch Service (3)
Amazon RDS (11)
Amazon Redshift (9)
Amazon S3 (21)
Amazon SNS (1)
Amazon SQS (2)
Amazon VPC (1)
Elastic Load Balancing (7)
Other (18)
Related Frameworks
Frequently Asked Questions
Is NIST CSF v2 mandatory for my organization?
For most private-sector organizations, no. CSF v2 is voluntary. Federal agencies must follow it under Executive Order 13800, and federal contractors may face contractual requirements to demonstrate CSF alignment. Several sector-specific regulators (FERC for energy, state insurance commissioners) reference CSF in binding rules. Even without a mandate, cyber insurers increasingly ask for CSF maturity tier assessments during underwriting.
What changed between CSF v1.1 and v2.0?
The addition of the Govern (GV) function is the biggest structural change. It raises cybersecurity governance, risk strategy, and supply chain risk management to a top-level function rather than distributing them across other categories. CSF v2 also added explicit measurement subcategories (GV.MT), dedicated supply chain risk management subcategories (GV.SC), and broadened applicability language beyond critical infrastructure to all organization types. The Informative References are now maintained online as a living catalog rather than a static appendix.
How do CSF v2 Tiers relate to compliance?
Tiers describe organizational maturity, not compliance levels. Tier 1 (Partial) means ad hoc risk management; Tier 4 (Adaptive) means risk decisions are data-driven and continuously refined. No specific tier is required. Your target should reflect your risk appetite, threat environment, and resource constraints. Auditors may ask you to document current and target tiers per function.
How do I map existing NIST 800-53 controls to CSF v2?
NIST maintains an online Reference Tool (https://csrc.nist.gov/projects/cybersecurity- framework/filters) with official mappings from CSF v2 subcategories to 800-53 Rev 5 controls. Export your 800-53 control inventory, then map each control to one or more CSF subcategories using the tool. Gaps typically surface in the Govern function (GV.OC, GV.RM, GV.SC), since those organizational governance requirements were not prominent in 800-53.
How long does a CSF v2 assessment take?
For a mid-size organization with an existing security program, a self-assessment typically runs 4 to 8 weeks, covering stakeholder interviews, evidence collection across all six functions, gap analysis, and target profile development. Third-party assessments add 2 to 4 weeks for report generation and review. The Govern function usually takes the most time; it requires documentation of board-level risk oversight, supply chain policies, and measurement programs that many organizations have not yet formalized.