The Six Functions of NIST CSF 2.0
NIST CSF 2.0 organizes cybersecurity activities into six core functions:
GOVERN (new in 2.0): Establishes and monitors the organization's cybersecurity risk management strategy, expectations, and policy. This includes executive accountability, risk tolerance definition, and cybersecurity into enterprise risk management. The Govern function recognizes that cybersecurity is fundamentally a business leadership issue, not just a technical one.
IDENTIFY: Develops an organizational understanding of cybersecurity risk to systems, people, assets, data, and capabilities. Includes asset inventory, risk assessment, and business environment mapping.
PROTECT: Implements appropriate safeguards to limit or contain the impact of a cybersecurity event. Includes access control, data security, protective technology (including Zero Trust Application Control), and awareness training.
DETECT: Defines appropriate activities to identify cybersecurity events. Includes continuous monitoring, log analysis, and anomaly detection.
RESPOND: Defines appropriate activities to take action regarding a detected cybersecurity incident. Includes incident response planning, communications, and mitigation.
RECOVER: Defines appropriate activities to maintain resilience and restore capabilities after a cybersecurity incident. Includes recovery planning, backup and restoration, and post-incident communications.
What Changed From CSF 1.1 to CSF 2.0
The most significant changes in CSF 2.0 are:
New GOVERN function. CSF 1.1 had five functions; 2.0 has six. Govern sits atop the framework and addresses leadership accountability, policy, and cybersecurity as an enterprise risk. Organizations that haven't addressed governance will have the largest gap when mapping to 2.0.
Expanded scope. CSF 1.0 was explicitly designed for critical infrastructure (energy, water, finance). CSF 2.0 is explicitly designed for "all organizations." This is NIST formally acknowledging that SMBs need the same structured approach.
Supply chain risk management elevated. Vendor and third-party risk now has dedicated subcategories within the Identify function. This is particularly relevant for manufacturers in the defense supply chain pursuing CMMC compliance.
Implementation tiers redesigned. The four tiers (Partial, Risk-Informed, Repeatable, Adaptive) now explicitly measure organizational cybersecurity maturity against the framework, making it easier to baseline current state and set target state.
Ohio Safe Harbor and NIST CSF 2.0
Ohio Revised Code Chapter 1354, the Ohio Data Protection Act (ODPA), provides an affirmative legal defense against data breach liability for organizations that implement and maintain a cybersecurity program that reasonably conforms to a recognized industry standard. NIST CSF 2.0 is explicitly listed as a qualifying framework.
To qualify for Ohio Safe Harbor protection, your cybersecurity program must: (1) be designed to protect the security and confidentiality of personal information; (2) protect against anticipated threats or hazards to the security of personal information; and (3) protect against unauthorized access or acquisition of personal information.
Importantly, Safe Harbor is an affirmative defense — it must be raised and proven in court. This means documentation matters as much as controls. Organizations must be able to demonstrate that they maintained a compliant program at the time of the incident. Securafy's Comply-CARE tier builds this documentation framework as a core deliverable.