NIST CSF 2.0 provides key guidance to organizations of all sizes looking to improve their security posture. Contrast Runtime Security ensures applications are effectively safeguarded, enabling you to meet and exceed these benchmarks.
The Cybersecurity Framework (CSF) from the National Institute of Standards and Technology (NIST) is designed to help organizations better understand and more effectively manage their cybersecurity risk. It is a voluntary framework that provides organizations with a set of best practices for managing cybersecurity risks.
NIST CSF is designed to be a valuable framework for organizations of all sizes that are looking to improve their cybersecurity posture. It can help organizations identify and prioritize their cybersecurity risks, develop and implement effective cybersecurity controls, and monitor and measure their cybersecurity performance.
NIST CSF is based on six core functions:
Further, NIST CSF has four tiers that highlight how an organization is managing its cybersecurity risks:
NIST CSF 2.0 is the latest version of the NIST Cybersecurity Framework, released in February 2024. It replaces NIST CSF 1.1, which was published in 2018.
The main differences between NIST CSF 1.1 and NIST CSF 2.0 are:
Another major difference between the two is in scope. Originally NIST CSF was designed solely for critical infrastructure, but NIST CSF 2.0 is designed to apply to organizations of all sizes and industries.
According to NIST, the purpose of CSF 2.0 is to help organizations better understand and more effectively manage their cybersecurity risk. NIST CSF 2.0 is intended to reflect the evolving threat landscape, particularly by placing a greater emphasis on risk management and by providing more detailed guidance on how to implement the framework.
NIST CSF 2.0 is important because it provides organizations with a comprehensive and up-to-date framework for managing their cybersecurity risks. It helps organizations to:
NIST CSF 2.0 applies to organizations of all sizes and industries. It is a voluntary framework, but it is widely recognized as a valuable tool for managing cybersecurity risks. Many organizations use NIST CSF 2.0 as a baseline for their cybersecurity programs, and some governments and regulators require organizations to comply with NIST CSF 2.0 or a similar framework.
There are a few sections within NIST CSF 2.0 that touch on application security testing (AST) and application detection and response (ADR):
Identify
Detect
Protect
Respond
Govern
Per ID.RA-1 and DE.CM-8, organizations must identify and document vulnerabilities and perform scanning for vulnerabilities. It does not say how or with what technologies, so the organization can easily decide to use interactive application security testing (IAST) here. Per DE.CM-1, organizations should use at least a web application firewall (WAF) or application detection and response (ADR), but we would ultimately recommend both.
Per GV.ME-1, organizations must monitor and analyze security performance. ADR generates detailed context on attacks, reporting on security incidents and application behavior. These can be used to monitor security performance, evaluate the effectiveness of security controls and make informed decisions about future security investments and strategies.
It is worthwhile to note that, by and large, NIST CSF 2.0 doesn't specifically call out any particular software or solution category. Rather, the goal is to ensure that organizations are approaching cybersecurity holistically and putting themselves in the best possible position.
In addition, a software bill of materials (SBOM) is a NIST recommended practice, but it is not specifically called out in the NIST CSF 2.0. In this vein, it’s also worthwhile to note that White House Executive Order 14028 specifically mentions SBOMs for supply chain security.
The Security Operations Center (SOC) in particular maps closely to the six core functions of NIST CSF:
For SOCs in particular, ADR plays a key role in helping them fulfill all elements of the NIST CSF core functions. ADR provides continuous visibility into the security behavior of the entire software stack, identifies anomalies that indicate security incidents, automatically takes action to mitigate these threats, and provides highly contextual feedback to operations and development teams. ADR fills the critical AppSec gap left by other detection and response solutions by providing deep, real-time visibility and protection directly within the application layer.
ADR automatically generates detailed, real-time security blueprints of every application and API, including how they connect with each other. These blueprints help teams ensure compliance with regulatory requirements such as NIST CSF 2.0 while also enabling effective security governance across the organization.
Note: Please be advised that the information provided on this webpage is not intended to be legal advice. While we strive to ensure the accuracy and reliability of the information, we cannot guarantee the completeness or currency of it. Laws are subject to change, and we cannot be held liable for any actions taken based on the information provided here. If you need legal advice, please consult with a qualified professional.