NIST Cybersecurity Framework v2.0
Best for: Federal contractors and agencies must align under Executive Order 13800. Critical infrastructure operators (energy, healthcare, financial services, water) encounter it through sector regulations that reference CSF directly. Cyber insurers increasingly require maturity tier assessments during underwriting. Organizations already mapped to NIST 800-53 or ISO 27001 use CSF v2 for board-level reporting. No revenue or size threshold; the framework applies from small businesses to multinationals.
| Mandatory? | Voluntary — widely adopted across sectors |
| Who validates? | Self-assessment; optional third-party |
| Renewal | No fixed cycle; continuous improvement |
| Scope | All organizations; six functions: Govern, Identify, Protect, Detect, Respond, Recover |
🏛 National Institute of Standards and Technology (NIST), U.S. Department of Commerce · NIST CSF v2.0 (Feb 2024) Official source →
Get Started
module "..." {
source = "nistcsf.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Certificate and Key Management: Five controls cover ACM certificate status (expiration within 30 days, failed state, pending validation), RSA key length (minimum 2048 bits), and certificate transparency logging. These map directly to PR.DS-01 and PR.DS-02.
- API Authorization and Access Control: Validates that API Gateway v1 and v2 routes and methods have authorization types configured and that authorizers (Lambda, Cognito, IAM) are attached. Four controls in total, mapping to PR.AA-01 through PR.AA-05.
- Encryption at Rest: Checks Athena workgroup encryption configuration. The full benchmark includes additional controls for S3, EBS, RDS, and other storage services, building a broader encryption-at-rest posture under PR.DS-01.
- Infrastructure Resilience: Three controls verify that Auto Scaling groups span multiple AZs, use capacity rebalancing, and attach ELB health checks. Maps to RC.RP-01 and PR.IR-01.
- Audit Logging and Monitoring: Confirms API Gateway stage logging and AppSync field-level logging are enabled. Maps to DE.CM-01 and DE.CM-09 for continuous monitoring of network and application activity.
- Account Governance: Checks that the AWS account belongs to an AWS Organizations structure. Maps to GV.OC-01 and GV.SC-01 for organizational context and supply chain governance.
What you handle
- Certificate and Key Management: Defining and documenting your certificate lifecycle policy, setting up automated renewal workflows, and managing any private CA hierarchies outside ACM.
- API Authorization and Access Control: Designing authorization logic within Lambda authorizers or Cognito user pool policies, reviewing least-privilege scopes and token expiration settings, and maintaining periodic user access reviews.
- Encryption at Rest: Selecting and managing KMS keys (CMK vs. AWS-managed), defining key rotation schedules, and documenting data classification policies that determine which data requires encryption.
- Infrastructure Resilience: Writing and testing recovery runbooks, defining RTO/RPO targets, conducting tabletop exercises, and documenting business continuity plans that go beyond infrastructure configuration.
- Audit Logging and Monitoring: Log retention periods, alerting thresholds in your SIEM, incident escalation workflows, and cross-service log correlation for threat detection.
- Account Governance: Defining and enforcing Service Control Policies (SCPs), establishing an organizational unit hierarchy, and documenting governance roles and responsibilities per the Govern function requirements.
Controls by Category
Data Protection and Encryption (PR.DS) (3 controls)
Expired or failed ACM certificates are an immediate flag; they indicate broken TLS in production. RSA keys below 2048 bits fail the minimum key length requirement under PR.DS-02. Certificate transparency logging gives auditors a verifiable record of issued certificates when they are validating PR.DS-01 and PR.DS-02 evidence.
Identity and Access Management (PR.AA) (3 controls)
The most common finding in this category is API Gateway methods left at authorization type NONE after a development stage gets promoted to production. Assessors want configuration exports showing the authorizer type (Cognito, Lambda, IAM) per route, and they will probe endpoints directly if the documentation looks incomplete.
Logging and Continuous Monitoring (DE.CM) (2 controls)
DE.CM calls for continuous monitoring of events that could indicate a cybersecurity incident. API Gateway stages need both execution and access logging flowing to a centralized destination with defined retention. AppSync field-level logging is the mechanism assessors look for when evaluating detection coverage for unauthorized GraphQL query patterns.
Additional Controls (125)
AWS CloudTrail (4)
AWS CodeBuild (2)
AWS Database Migration Service (3)
AWS Systems Manager (1)
Amazon CloudFront (3)
Amazon CloudWatch (3)
Amazon CloudWatch Logs (1)
Amazon DocumentDB (1)
Amazon DynamoDB (4)
Amazon EBS (3)
Amazon EC2 (5)
Amazon ECR (2)
Amazon ECS (1)
Amazon EFS (2)
Amazon ElastiCache (4)
Amazon Kinesis (3)
Amazon Neptune (5)
Amazon OpenSearch Service (3)
Amazon RDS (11)
Amazon Redshift (9)
Amazon S3 (21)
Amazon SQS (2)
Elastic Load Balancing (7)
Other (18)
Related Frameworks
NIST 800-53 Rev 5 — 🟢 High overlap (85%)
NIST 800-53 Rev 5 is the detailed control catalog that CSF v2 references. CSF Categories and Subcategories map directly to 800-53 control families. Satisfying 800-53 covers most CSF v2 subcategories, though CSF v2's Govern function introduces organizational risk governance expectations that go beyond 800-53's PM family.
ISO/IEC 27001:2022 — 🟢 High overlap (70%)
NIST published a formal crosswalk between CSF v2 and ISO 27001:2022 Annex A controls. The Protect and Detect functions align closely with ISO 27001 domains A.8 (Technology) and A.12 (Operations Security). ISO 27001 requires a certified ISMS, which CSF does not, so the governance models differ.
SOC 2 — 🟡 Medium overlap (55%)
SOC 2 Trust Services Criteria (especially CC6 and CC7) partially overlap with CSF v2 Protect and Detect functions. SOC 2 focuses on service organization controls with formal audit attestation, while CSF v2 is a voluntary risk management framework. Controls for encryption, access management, and monitoring commonly satisfy both.