Skip to content
Cybersecurity | | 7 min read

NIST Cybersecurity Framework - Identify and Protect functions in practice

Practical implementation of NIST Cybersecurity Framework 2.0 Identify and Protect functions: asset inventory, risk assessment, access control, data protection, and NIS2 alignment.

J
Jakub Walarus
NIST CSFframeworkcompliancerisk management
NIST Cybersecurity Framework - Identify and Protect functions in practice

The NIST Cybersecurity Framework (CSF) is one of the most widely adopted tools for structuring an organization’s cybersecurity program. First published in 2014 and updated to version 2.0 in February 2024, the framework defines six functions: Govern, Identify, Protect, Detect, Respond, and Recover. Each answers a different question: Govern - who makes decisions? Identify - what are we protecting? Protect - how do we prevent? Detect - how do we find? Respond - how do we react? Recover - how do we restore?

This article focuses on the first two operational functions - Identify and Protect - because they build the foundation without which the remaining functions cannot operate effectively. You cannot detect threats to assets you do not know exist. You cannot respond to incidents when basic access controls are missing.

NIST CSF 2.0 - what changed

Version 2.0 introduced several significant changes compared to version 1.1:

AspectCSF 1.1 (2018)CSF 2.0 (2024)
ScopeCritical infrastructureAll organizations, regardless of sector and size
Functions5 (Identify, Protect, Detect, Respond, Recover)6 (added Govern)
GovernNoneNew function: governance, strategy, roles, policies
ProfilesCommunity ProfilesOrganizational Profiles + Community Profiles
Supply chainLimitedExpanded C-SCRM requirements
Continuous improvementImplicitExplicit improvement subcategories in each function

The addition of the Govern function is the most significant change. NIST recognized that without clear decision-making structures, roles, and responsibilities, even the best technical controls do not deliver expected results. Govern “wraps around” all other functions and provides organizational context.

The Identify function - what we protect and from what

Identify answers fundamental questions: what assets does the organization own, what data does it process, who has access, and what risks are associated.

ID.AM - Asset Management

You cannot protect what you cannot see. Asset inventory is the starting point of every security program. NIST CSF 2.0 expands the scope of inventory to include:

  • Hardware assets (servers, workstations, mobile devices, IoT, PLC controllers)
  • Software assets (applications, operating systems, firmware)
  • Data assets (where stored, how classified, who has access)
  • Human assets (roles, permissions, access to critical systems)
  • External assets (cloud services, suppliers, API interfaces)

TIP

In OT environments, asset inventory poses a particular challenge. Active scanning can disrupt controller operation. NIST SP 800-82 Rev. 3 recommends passive network traffic monitoring as a safe method for ICS asset inventory.

ID.RA - Risk Assessment

After identifying assets, the next step is risk assessment. NIST CSF 2.0 expects:

  1. Threat identification - which APT groups, which malware types, which attack scenarios are realistic for our sector
  2. Vulnerability identification - what gaps exist in our systems, processes, and procedures
  3. Likelihood and impact assessment - a risk matrix combining the probability of threat materialization with its impact on the organization
  4. Risk prioritization - which risks require immediate action, which can be accepted

ID.IM - Improvement

A new subcategory in CSF 2.0 - continuous improvement of identification processes. It includes:

  • Regular asset inventory reviews (at minimum quarterly)
  • Risk assessment updates after infrastructure changes or threat landscape shifts
  • Benchmarking against industry standards and best practices

The Protect function - how we prevent

Protect encompasses controls that reduce the likelihood and impact of a security incident. It is the broadest function in terms of technology and process scope.

PR.AA - Identity management and access control

Access control is the foundation of protection. NIST CSF 2.0 expects:

  • Least privilege principle - every user and system has only the permissions necessary to perform their tasks
  • Multi-factor authentication (MFA) - required on all administrative and remote interfaces
  • Identity lifecycle management - procedures for creating, modifying, and removing accounts
  • Access reviews - regular verification that granted permissions remain justified

PR.DS - Data security

  • Encryption of data at rest and in transit
  • Data classification with controls appropriate to the classification
  • Backups with regular restoration verification
  • Data flow control (DLP - Data Loss Prevention)

PR.PS - Platform security

System and application hardening:

  • Configuration based on CIS Benchmarks or DISA STIGs
  • Regular updates and patching (NIST recommends 15-day SLA for critical, 30 for high)
  • Disable unused services and ports
  • Endpoint protection (EDR/XDR)
  • Network segmentation - isolating critical systems

PR.AT - Awareness and training

  • Security awareness training for all employees (at minimum annually)
  • Specialized training for technical personnel (administration, SOC, OT)
  • Phishing simulations and incident response exercises
  • Cybersecurity training for management

WARNING

One-off training (“once a year, check the compliance box”) has minimal effectiveness. NIST CSF 2.0 emphasizes the need for continuous competency building, not merely satisfying a formal requirement.

PR.IR - Technology infrastructure resilience

A new subcategory in CSF 2.0 covering:

  • Redundancy of critical systems and communication links
  • Business continuity plan testing (BCP/DRP)
  • Fault-tolerant architecture (failover, load balancing)

Implementation checklist for Identify + Protect

Identify

  • Complete IT and OT asset inventory (hardware, software, data)
  • Asset classification by criticality to business processes
  • Data flow maps (source, destination, channels)
  • Formal risk assessment with likelihood/impact matrix
  • Identification of regulatory requirements (NIS2, DORA, GDPR)
  • Supply chain analysis - key suppliers and their risk profiles

Protect

  • MFA on all administrative and remote interfaces
  • Least privilege principle implemented and audited
  • Encryption of data at rest and in transit
  • Regular backups with restoration verification
  • System hardening per CIS Benchmarks
  • Training program and phishing simulations
  • Network segmentation with boundary controls
  • Business continuity plan tested within the last 12 months

NIST CSF and NIS2

For European Union organizations subject to the NIS2 Directive, NIST CSF serves as an excellent tool for meeting regulatory requirements. Mapping:

NIS2 Requirement (Art. 21)NIST CSF 2.0 Function
Risk analysis policiesGovern + Identify (ID.RA)
Incident handlingDetect + Respond
Business continuityProtect (PR.IR) + Recover
Supply chain securityGovern (GV.SC) + Identify
Network securityProtect (PR.PS, PR.DS)
TrainingProtect (PR.AT)
CryptographyProtect (PR.DS)
Access controlProtect (PR.AA)

NIST CSF is not mandatory in the EU, but its structure enables systematic addressing of NIS2 requirements without building a process from scratch.

Where to start

NIST CSF implementation does not require a single, large-scale project. NIST recommends an iterative approach:

  1. Current Profile - describe the organization’s current cybersecurity state
  2. Target Profile - define the desired state (considering regulatory requirements and risk appetite)
  3. Gap Analysis - compare both profiles and identify gaps
  4. Prioritized Action Plan - plan actions to close gaps, starting with those having the highest impact on risk reduction

Organizations that need support in building or improving a cybersecurity program based on NIST CSF can benefit from an experienced partner who will guide the process from current state assessment to implementing specific controls.


Sources:

  • NIST, Cybersecurity Framework 2.0, February 2024 - nist.gov
  • NIST SP 800-53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations - nist.gov
  • ENISA, NIS2 Directive Implementation Guidance - enisa.europa.eu
  • NIST SP 800-82 Rev. 3, Guide to Operational Technology (OT) Security - nist.gov

Need help in this area?

Our experts will help you assess the risk and plan next steps.

Talk to an expert

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert