Compliance Framework

NIST CSF 2.0 Compliance Checklist

This index lists all 28 controls in the NIST CSF 2.0 framework organized by function. Each control page includes an implementation checklist and audit evidence requirements to help your organization achieve and maintain compliance.

About NIST CSF 2.0

The NIST CSF 2.0 provides a structured approach to managing cybersecurity risk. It organizes cybersecurity outcomes into six core functions: Govern, Identify, Protect, Detect, Respond and Recover. Each function contains categories and subcategories that define specific security outcomes organizations should achieve.

The framework is published by the National Institute of Standards and Technology (NIST) and is widely adopted across industries for cybersecurity risk management and regulatory compliance.

All Controls

GV: Govern

Establish and monitor the organization's cybersecurity risk management strategy, expectations and policy.

Control ID Title Category
GV.OC-01Organizational ContextOrganizational Context
GV.OC-02Internal StakeholdersOrganizational Context
GV.RM-01Risk Management ObjectivesRisk Management Strategy
GV.RM-02Risk Appetite StatementsRisk Management Strategy
GV.SC-01Supply Chain Risk ManagementSupply Chain Risk Management

ID: Identify

Understand the organization's current cybersecurity risks by identifying assets, vulnerabilities and threats.

Control ID Title Category
ID.AM-01Hardware Asset InventoryAsset Management
ID.AM-02Software Asset InventoryAsset Management
ID.AM-07Data Asset InventoryAsset Management
ID.RA-01Vulnerability IdentificationRisk Assessment
ID.RA-02Threat IntelligenceRisk Assessment

PR: Protect

Use safeguards to prevent or reduce cybersecurity risk to acceptable levels.

Control ID Title Category
PR.AA-01Identity ManagementIdentity Management, Authentication and Access Control
PR.AA-03Multi-Factor AuthenticationIdentity Management, Authentication and Access Control
PR.AA-05Access Permissions and AuthorizationsIdentity Management, Authentication and Access Control
PR.DS-01Data-at-Rest ProtectionData Security
PR.DS-02Data-in-Transit ProtectionData Security
PR.PS-01Configuration ManagementPlatform Security

DE: Detect

Find and analyze possible cybersecurity attacks and compromises in a timely manner.

Control ID Title Category
DE.CM-01Network MonitoringContinuous Monitoring
DE.CM-03Personnel Activity MonitoringContinuous Monitoring
DE.CM-06External Service Provider MonitoringContinuous Monitoring
DE.AE-02Adverse Event AnalysisAdverse Event Analysis
DE.AE-06Incident DeclarationAdverse Event Analysis

RS: Respond

Take action regarding a detected cybersecurity incident to contain and mitigate its impact.

Control ID Title Category
RS.MA-01Incident Management Plan ExecutionIncident Management
RS.MA-03Incident Categorization and PrioritizationIncident Management
RS.CO-02Incident ReportingIncident Response Reporting and Communication
RS.MI-01Incident ContainmentIncident Mitigation

RC: Recover

Restore assets and operations affected by a cybersecurity incident to normal operation.

Control ID Title Category
RC.RP-01Recovery Plan ExecutionIncident Recovery Plan Execution
RC.RP-04Recovery VerificationIncident Recovery Plan Execution
RC.CO-03Recovery CommunicationRecovery Communication

Need Help With NIST CSF 2.0 Compliance?

Our penetration testing and risk assessments map directly to NIST CSF 2.0 controls. Sherlock Forensics identifies gaps in your compliance posture and provides actionable remediation guidance.

Get a Compliance Assessment