Skip to content
The Algorithm
The Algorithm/Knowledge Base/NIST CSF 2.0 — What Changed from 1.1 and Engineering Implications
Security Frameworks

NIST CSF 2.0 — What Changed from 1.1 and Engineering Implications

NIST CSF 2.0 is not an incremental update — the addition of the Govern function and expanded supply chain requirements fundamentally change how regulated organisations must structure their cybersecurity programs.

What You Need to Know

NIST released Cybersecurity Framework (CSF) version 2.0 in February 2024, the first major revision since version 1.1 in 2018. The most significant structural change is the addition of a sixth function: Govern (GV). Where CSF 1.1 had five functions (Identify, Protect, Detect, Respond, Recover), CSF 2.0 elevates governance — cybersecurity strategy, roles and responsibilities, policy, oversight, and supply chain risk management — into a dedicated function with its own categories and subcategories. This reflects the recognition that cybersecurity governance failures, not purely technical gaps, are the root cause of most significant incidents. The framework also broadens its intended audience: CSF 2.0 explicitly targets organizations of all sizes and sectors, including critical infrastructure, and aligns more explicitly with international standards including ISO/IEC 27001:2022.

From an engineering implementation perspective, the key changes in CSF 2.0 include: (1) The Govern function introduces 6 categories (GV.OC through GV.SC) requiring formalized cybersecurity strategy documents, defined roles with accountability, and a Cybersecurity Supply Chain Risk Management (C-SCRM) program — the latter expanding on CSF 1.1's ID.SC category. (2) The Identify function is expanded with new subcategories covering asset management for software (ID.AM-07, ID.AM-08) and improvement activities. (3) CSF 2.0 introduces tiered Profiles, allowing organizations to document current and target states for each function and create implementation roadmaps. (4) The framework now explicitly references NIST SP 800-218 (Secure Software Development Framework) and NIST SP 800-161r1 (C-SCRM) as companion resources. Organizations using CSF 1.1 as a regulatory baseline must update gap assessments and control mappings to the revised subcategory numbering.

For regulated industries, CSF 2.0 has specific implications in how regulators reference it. The SEC's cybersecurity disclosure rules (effective December 2023) and FFIEC Cybersecurity Assessment Tool both reference CSF as a baseline. The HHS Office for Civil Rights increasingly references CSF alongside HIPAA Security Rule requirements. A nuance in CSF 2.0 is that it does not prescribe implementation but provides example mappings to other frameworks (NIST SP 800-53 r5, ISO 27001, CIS Controls v8, COBIT 2019) via the online CSF Reference Tool. Organizations migrating from 1.1 to 2.0 must re-map their existing control environments to the revised subcategory taxonomy and assess gaps in the new Govern function, which typically requires formal board-level cybersecurity oversight documentation and supplier risk assessment programs.

How We Handle It

We conduct CSF 1.1-to-2.0 gap assessments that map existing controls to the revised subcategory taxonomy, identify gaps in the new Govern function, and produce implementation roadmaps aligned to NIST SP 800-53 r5 and ISO 27001:2022 controls. Our deliverables include board-ready governance documentation, C-SCRM program templates, and updated Current/Target Profile documents.

Services
Service
Compliance Infrastructure
Service
Regulatory Intelligence
Service
Self-Healing Infrastructure
Related Frameworks
NIST CSF 2.0 (2024)
NIST SP 800-53 r5
NIST SP 800-161r1
NIST SP 800-218
ISO/IEC 27001:2022
CIS Controls v8
DECISION GUIDE

Compliance-Native Architecture Guide

Design principles and a structured checklist for building software that is compliant by default — not compliant by retrofit. Covers data architecture, access controls, audit trails, and vendor due diligence.

§

Compliance built at the architecture level.

Deploy a team that knows your regulatory landscape before they write their first line of code.

Start the conversation
Related
Service
Compliance Infrastructure
Service
Regulatory Intelligence
Service
Self-Healing Infrastructure
Related Framework
NIST CSF 2.0 (2024)
Related Framework
NIST SP 800-53 r5
Related Framework
NIST SP 800-161r1
Platform
ALICE Compliance Engine
Service
Compliance Infrastructure
Engagement
Surgical Strike (Tier I)
Why Switch
vs. Accenture
Get Started
Start a Conversation
Engage Us