October 20, 2025

Guide to NIST CSF 2.0

Written by
Rebecca Williams
GRC Consultant

The NIST Cybersecurity Framework (CSF) 2.0 reflects a decade of adoption across industries. It revises the original model to meet current realities of cloud infrastructure, AI-based systems, and global supply chains. The new framework continues to be flexible and risk-based. 

As an organization, whether you are starting from the beginning or modifying something useful, this guide will discuss the main features of NIST CSF 2.0 and how organizations can connect it with other standards, such as ISO 27001.

What is NIST CSF 2.0?

The NIST Cybersecurity Framework (CSF) provides a structured, outcome-based approach for supporting the management and reduction of cybersecurity risk and is maintained by the National Institute of Standards and Technology.

Version 2.0, released in early 2024, is no longer limited to just critical infrastructure but applies to all industries and all organizations, regardless of size. The new version builds on the previous version with updated language, greater integration with governance, and clearer connections to privacy and supply-chain risk management.

This six-function model reflects the lifecycle of risk management, emphasizing governance and adaptability as ongoing processes rather than one-time efforts.

Profiles & tiers

NIST CSF 2.0 uses Profiles and Tiers to help organizations tailor their implementation according to their maturity and risk appetite. 

Profiles

Profiles express how your current cybersecurity outcomes compare to your target outcomes. Use them to prioritize improvements and track progress.

Current Profile

  • Evidence of what is in place today
  • Gaps tied to business risk
  • Baseline for measuring change

Target Profile

  • Desired outcomes by function
  • Owners, timelines, metrics
  • Roadmap for investment
Tiers

Tiers describe how broadly and consistently the framework is implemented. They help set maturity goals that fit your risk appetite.

Tier 1 — Partial

  • Ad hoc practices
  • Limited visibility
  • Reactive response

Tier 2 — Risk-informed

  • Policies exist
  • Inconsistent execution
  • Some measurement

Tier 3 — Repeatable

  • Defined processes
  • Regular assessment
  • Cross-functional coordination

Tier 4 — Adaptive

  • Continuous improvement
  • Automation and analytics
  • Integrated with ERM

Most organizations aim for Tier 3 maturity before advancing to adaptive or automated programs.

Why NIST CSF matters

The CSF (cybersecurity framework) has emerged as the accepted global baseline for cybersecurity. It is recognized across sectors (finance, healthcare, government contracting, critical infrastructure) by regulators, supply-chain partners, and auditors. 

Benefits of adopting NIST CSF 2.0

  • Aligns cybersecurity with business and governance priorities.
  • Reduces complexity by harmonizing controls across frameworks.
  • Facilitates measurable progress through Profiles and Tiers.
  • Assists in mapping to standards like ISO 27001, SOC 2, and HIPAA.
  • Provides a common language between technical and executive stakes.

For organizations already managing ISO or SOC programs, CSF 2.0 is your pathway between risk and resilience; connecting your controls to regulatory and customer outcomes.

Steps to build a NIST CSF 2.0 profile

Build your NIST CSF profile

Define scope

Systems, business units, and risk boundaries for your profile.

Assemble team

IT, security, legal, privacy, and business stakeholders.

Assess current outcomes

Map practices to CSF functions and categories.

Set target outcomes

Define goals by function with owners and timelines.

Prioritize actions

Risk-based plan for the highest value gaps.

Monitor and improve

Track metrics, incidents, and lessons learned.

Mapping NIST CSF 2.0 to ISO 27001

CSF function
Govern
ISO 27001 area
Context, leadership, risk assessment
Key alignment
Risk context, scope, roles, and accountability

Tip: align leadership objectives and metrics with your cyber outcomes before implementing controls.

Organizations pursuing dual alignment can reuse evidence across both frameworks, significantly reducing audit fatigue and duplication.

NIST CSF 2.0 provides a flexible, scalable foundation for cybersecurity resilience.

It helps organizations move from compliance checklists to adaptive, outcome-driven risk management.

With Complyance, you can automate control mapping, monitor continuous compliance, and visualize CSF maturity in real time; turning framework adoption into measurable progress.

Start by building your NIST CSF Profile with Complyance. Book a demo and see how automation and AI-driven insights can streamline risk tracking and control monitoring.

FAQs

Is NIST CSF mandatory? No. It’s a voluntary framework, but it’s widely referenced in contracts, regulations, and government procurement.

How does NIST CSF 2.0 differ from 1.1? The new version adds the Govern function, clarifies roles, and updates references to modern technologies such as AI and supply-chain dependencies.

How often should a CSF Profile be updated? At least annually or after any major business, regulatory, or threat landscape change.

Can NIST CSF be audited? While not formally certifiable, organizations can conduct independent assessments or align with frameworks like ISO 27001 for certification.

Complyance is the AI powered, end-to-end GRC platform