<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

NIST Cybersecurity Framework

What's New in the NIST Cybersecurity Framework 1.1

down-arrow

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) provides a way for organizations to prioritize cybersecurity resources and help them make risk-related decisions. Using the CSF, businesses can identify, assess, and take actions to reduce cyber risk while enhancing communication within their organization and with partners, suppliers, and regulators.

A History of the NIST CSF

The first NIST Cybersecurity Framework, Version 1.0, was published in February 2014, after a year in development. Created by a collaboration of industry, academic, and government stakeholders, the first version of the CSF primarily targeted organizations that are part of the United States’ critical infrastructure.  

It Began with an Executive Order to Reduce Cyber Risk

In February 2013, a Presidential Order instructed the Secretary of Commerce to “lead the development of a framework to reduce cyber risks to critical U.S. infrastructure. “There would be “a set of standards, methodologies, procedures, and processes that would align policy, business, and technological approaches to address cyber risks.” The result was the NIST Cyber security Framework v1.0., introduced in February 2014.

The rationale was to create a set of practices, standards, and industry guidelines to help organizations tied to the nation’s financial, energy, healthcare, and other critical industry sectors better protect their information and physical assets from cyber-attacks. The CSF incorporated voluntary consensus standards and industry best practices consistent with voluntary international standards.

Built using three layers - the Framework Core, Framework Implementation Tiers, and Profiles - the CSF (formally known as the Framework for Improving Critical Infrastructure Cybersecurity) was most remarkable for its outcomes-based approach to cybersecurity risk management. 

In 2015, the process for updating Cybersecurity Framework got underway, and in December 2017, NIST released the second draft of Framework v1.1. The new profile was meant to take into account public and private sector feedback received by NIST since v1.0 was published to improve on cybersecurity standards and industry guidelines. This included hundreds of written comments and conversations with over 1,000 participants at the 2016 and 2017 annual workshops, where CyberSaint’s Founder was also in attendance providing feedback on the CSF. Two drafts of version 1.1 were also circulated for public comments. 

What’s New In NIST Cybersecurity Framework Version 1.1

Four years after Framework v1.0 was introduced, NIST released v1.1. The new goal was for Framework v1.1 to not only be flexible enough to be adopted by federal agencies, and state and local governments, but by large and small companies and organizations across all industry sectors.

The update replaced current cybersecurity standards. It clarified, refined, and enhanced the Framework - increasing its value and making it easier for even more organizations to use it in managing their cybersecurity risk. The NIST Cybersecurity Framework v1.1 is consistent with and builds upon v1.0, and it remains flexible, voluntary, and cost-effective.

Summary of Updates in NIST Cybersecurity Framework 1.1

  • Broader Applicability: The Cybersecurity Framework declares its applicability for IT, OT, cyber-physical systems, and IoT.
  • Emphasis on Supply Chain: There is enhanced guidance for applying the CSF to vendor risk management and supply chain risk management.
  • Access Control Category Nomenclature: The Access Control Category has been renamed Identity Management and Access Control, to better account for authentication, authorization, and identity-proofing.
  • Updates to Informative References: The new version administratively updates the Informative References.
  • Terminology Clarification: The term “utility” is clarified as a structure and language for organizing and expressing compliance with an organization’s cybersecurity requirements.
  • Risk Assessment Guidelines: A new section explains how the CSF can be used to understand and assess cybersecurity risk, especially for self-assessment, making it easier to compare current to past conditions.
  • New Subcategories: A subcategory has been added related to the vulnerability disclosure lifecycle.
  • Purchasing Guidance: A new section focuses on aiding in the understanding of the risk that comes with commercial, off-the-shelf products and services.
  • Risk Added to Implementation Tiers: Further risk-management criteria were added to the Implementation Tiers.

Also, NIST released an updated companion document, the Roadmap for Improving Critical Infrastructure Cybersecurity, which describes key areas of development, alignment, and collaboration. 

The Framework Updating Process Continues

Designed to be relevant for every size, sector, and type of organization, NIST’s latest Cybersecurity Framework draft has evolved to become more informative, useful, and inclusive of organizations, in both government and the private sector. 

“The release of the Cybersecurity Framework 1.1 is a significant advance that truly reflects the success of the public-private model for addressing cybersecurity challenges,” said Walter Copan, NIST director.

The NIST also continues to support the development of voluntary, industry-led cybersecurity standards and best practices. The process used to update the framework is now published on the Cybersecurity Framework website to ensure everyone involved understands how future updates are made. 

You may also like

Informing Cyber Risk Management ...
on May 18, 2023

Cybersecurity is no longer just an IT issue but a business risk that can impact an organization's reputation, financial health, and legal compliance. Cybersecurity risks are ...

Is Your Organization Prepared for ...
on May 3, 2023

Data storage, as well as maintenance tools and applications, have undergone many iterations in the past decade, with the introduction of cloud computing and Security Information ...

Strategies for Automating a Cyber ...
on May 8, 2023

Cybersecurity leaders and teams are overburdened by several growing trends and issues. And when your cybersecurity team is overworked and unequipped to manage cyber risk ...

Selecting the Right Cyber Risk ...
on April 13, 2023

Cyber risk quantification is the process of determining the likelihood and potential impact of a cyber attack or security breach. The probability and impact will vary based on ...

Leveraging Cyber Security ...
on May 26, 2023

A common misunderstanding with cyber risk management is that only the CISO and security practitioners should be concerned about cyber and information security. Instead, the state ...

Tips and Tricks to Transform Your ...
on April 12, 2023

Simply being “cyber aware” is an unviable option for board members as the impact of cybersecurity expands beyond IT systems. An unnoticed security gap or dated risk assessment are ...