Internet Security Auditors Blog

How to Adapt an Existing Security Program to the NIST Cybersecurity Framework 2.0

Written by Marcel Peña | Dec 29, 2025 10:51:08 AM

The publication of the NIST Cybersecurity Framework (CSF) 2.0 in February 2024 marked the most significant update to the framework since its creation in 2014. While the essence of the CSF—its function‑ and category‑based approach—remains intact, the conceptual and structural changes introduced require a careful review and alignment of existing cybersecurity programs.

Many organizations adopted NIST CSF 1.1 (2018) as a reference or foundation for their risk‑management policies. Now they must ask themselves:

How can we evolve toward version 2.0 without rebuilding everything from scratch?
How do we adjust what we already have to the new framework?

This article offers a practical and gradual path to carry out that transition efficiently and without reinventing the entire program, outlining practical recommendations that facilitate adaptability.

1. Understand the Key Differences Between CSF 1.1 and CSF 2.0

Before beginning any adaptation, it is essential to understand what has changed and how it impacts operations.

Most Relevant Changes
▪️Expanded scope: CSF 2.0 is no longer oriented or limited to critical infrastructure; it
     is designed and adapted for any organization—public or private, large or small.
▪️New “Govern” function: A sixth function is added, explicitly introducing corporate
      cybersecurity governance, strengthening alignment between security and business,
      and elevating cybersecurity to a strategic level.
▪️Updated categories and subcategories: Several areas are restructured for greater
     clarity, and new subcategories are added (for example, those related to supply‑chain
     management and performance metrics).
▪️Practical resources: NIST releases quick guides, implementation examples, and
     online tools that accompany the framework.
▪️Greater emphasis on measurement and maturity: The new CSF promotes
     continuous risk management with metrics and indicators that measure progress.

Understanding these differences helps focus the transition on the areas with the greatest impact and clarifies the organization’s situation at the time of making the change.

2. Assess the Starting Point

The transition begins with a structured assessment of the existing program.

The goal is not to redo everything, but to identify gaps between the current program and the requirements or recommendations of CSF 2.0.

Suggested Steps:

  1. Map the existing program to the functions and categories of CSF 1.1.
  2. Compare those mappings with the functions and categories of CSF 2.0, identifying changes or new elements (for example, governance aspects or third‑party management).
  3. Identify uncovered areas—those the organization has not yet formally addressed (such as maturity metrics, executive oversight, or supply‑chain risks).
  4. Assign a maturity rating or compliance level to each area (e.g., “Initial,” “Managed,” “Defined,” “Measured,” “Optimized”).
This diagnostic assessment will serve as the foundation for planning the transition.

3. Incorporate the New “Govern” Function

The Govern function is undoubtedly the most significant change in CSF 2.0.

It is not about technical controls, but about the organizational and strategic structure that supports cybersecurity and governs the company.

Key Steps to Implement It
▪️Define the corporate cybersecurity policy and its alignment with the organization’s
     strategic objectives.
▪️Assign clear roles and responsibilities (risk committees, CISO, board of directors,
     audit, etc.).
▪️Formalize oversight and accountability processes.
▪️Integrate cybersecurity into the organization’s enterprise risk management (ERM).
▪️Align the security strategy with organizational culture and corporate values.

Integrating “Govern” does not mean adding bureaucracy, but ensuring that cybersecurity is managed from leadership—not just from the technical area.

4. Update Policies, Controls, and Procedures

Once governance is incorporated, the next step is to review existing policies and controls to align them with the updated categories and subcategories of CSF 2.0.

Practical Recommendations:
▪️Review data‑protection, access, continuity, incident‑response, and recovery
      policies
to ensure they reflect the conceptual changes of the new framework.
▪️Include elements of third‑party and supply‑chain management—contracts, audits,
      and vendor monitoring.
▪️Align response and recovery plans with the “Govern” function so they include
      leadership roles and executive communication.
▪️Incorporate controls for managing metrics, indicators, and reporting to senior
      leadership.

The result should be a coherent policy system aligned with the new six‑function structure.

5. Communicate and Train

The transition is not only technical—it requires cultural change.

Staff must understand what CSF 2.0 entails, why it is being adopted, and how it affects their work.

Best Practices:
▪️Develop short training sessions tailored to different audiences (technical,
      executive, operational).
▪️Communicate progress and benefits of the transition across the organization.
▪️Ensure leaders deliver consistent messages about the importance of cybersecurity
     governance.

This reinforces the security culture and helps consolidate adoption of the new framework.

6. Establish a Continuous Improvement Plan

CSF 2.0 is not a project with a fixed end; it is a continuous improvement cycle.

Once the program is adapted, it is recommended to establish a plan with periodic (annual) reviews to:
▪️Reassess maturity and risks.
▪️Incorporate lessons learned from incidents.
▪️Adjust policies and metrics to new technological or regulatory contexts.
▪️Review the effectiveness of governance and communication.

The key is to keep the framework updated, dynamic, and aligned with the evolving threat landscape.

Conclusion

Adapting an existing security program to NIST CSF 2.0 does not mean starting from scratch, but evolving toward a more strategic, measurable, and governed model.

Additionally, the increased focus on indicators, maturity, and continuous risk management enables organizations to objectively demonstrate program evolution, justify investments, and strengthen data‑driven decision‑making. This turns the transition from a documentation exercise into an opportunity to optimize processes and reinforce organizational resilience.

The transition to CSF 2.0 invites organizations to elevate their maturity level, foster a holistic view of security, and consolidate a governance model that supports sustainable growth and digital trust.



References
🔗 National Institute of Standards and Technology (NIST). (2024). NIST Cybersecurity Framework 2.0.
Special Publication 1299.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1299.pdf
🔗 Pascoe, C., Quinn, S., & Scarfone, K. (2024, February 26). The NIST Cybersecurity Framework (CSF) 2.0 (NIST Cybersecurity White Papers, CSWP 29). National Institute of Standards and Technology. 
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
🔗 NIST (2024). NIST Cybersecurity Framework 2.0 Quick Start Guide for Small and Medium Businesses.
https://www.nist.gov/system/files/documents/2024/03/20/March20_2024_NISTCSF2.0_SMBQSG.Overview.pdf
🔗 National Institute of Standards and Technology (NIST). (2024). Change Analysis CSF 1.1-2.0
https://www.nist.gov/document/csf-11-csf-20-core-transition-changes