NIST CSF 2.0: The 6 Core Functions – Govern, Identify, Protect, Detect, Respond, Recover
The NIST Cybersecurity Framework 2.0 defines six core functions for effective cybersecurity management. With the new Govern function, CSF 2.0 places strategic oversight at the center. We support you in implementing all six functions – from governance through detection to recovery.
- ✓All 6 NIST CSF 2.0 core functions covered – including the new Govern function
- ✓Structured implementation from governance through recovery
- ✓Integration with DORA, NIS2 and ISO 27001 requirements
- ✓Measurable improvement in cybersecurity resilience and compliance
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
- Your strategic goals and objectives
- Desired business outcomes and ROI
- Steps already taken
Or contact us directly:
Certifications, Partners and more...










The 6 NIST CSF 2.0 Core Functions Explained
Our Expertise
- Deep experience with NIST CSF 2.0 and all 6 core functions
- Proven implementation methodology in regulated industries (finance, energy, healthcare)
- Holistic approach: governance, technology and organizational change
- Experience integrating CSF 2.0 into existing ISMS structures
Important: NIST CSF 2.0 replaces 1.1
Since February 2024, NIST CSF 2.0 is the current version. The key update is the sixth function Govern, which establishes cybersecurity governance as a strategic leadership responsibility. Organizations should update existing CSF implementations to version 2.0.
ADVISORI in Numbers
11+
Years of Experience
120+
Employees
520+
Projects
We follow a structured approach to implementing all six NIST CSF 2.0 core functions, ensuring both technical excellence and strategic alignment.
Our Approach:
GOVERN Phase: Establishing cybersecurity governance, risk strategy and policies at the leadership level
IDENTIFY Phase: Comprehensive asset inventory, risk assessment and dependency analysis
PROTECT Phase: Implementation of access controls, data security and security training
DETECT Phase: Building continuous monitoring, anomaly detection and threat analysis
RESPOND Phase: Development of structured incident response processes and communication plans
RECOVER Phase: Establishing robust recovery processes and business continuity measures
"The systematic implementation of all five NIST CSF core functions with ADVISORI has fundamentally transformed our cybersecurity architecture. The comprehensive approach and structured execution have enabled us to develop a truly resilient and adaptive cybersecurity posture that not only minimizes risks but also enables business growth."

Sarah Richter
Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
Our Services
We offer you tailored solutions for your digital transformation
IDENTIFY & PROTECT Implementation
Complete implementation of the Identify and Protect functions with comprehensive asset management and safeguards.
- Comprehensive asset management and inventory
- Risk assessment and business environment analysis
- Governance structures and risk management strategies
- Access controls, data protection, and awareness programs
DETECT, RESPOND & RECOVER Implementation
Building advanced detection capabilities and structured response and recovery processes.
- Continuous security monitoring and anomaly detection
- Security Operations Center (SOC) and detection engineering
- Incident response plans and communication strategies
- Business continuity and disaster recovery planning
Our Competencies in NIST Cybersecurity Framework
Choose the area that fits your requirements
Integrating the NIST Cybersecurity Framework with existing standards like ISO 27001, BSI IT-Grundschutz, or DORA requires strategic planning and deep expertise. We handle the mapping, harmonization, and sustainable embedding in your organization.
A thorough maturity assessment based on the NIST Cybersecurity Framework 2.0 reveals exactly where your organization stands across all four implementation tiers and which steps lead to the next level. We develop data-driven roadmaps that systematically and measurably elevate your cybersecurity maturity – from baseline analysis through gap assessment to prioritized implementation.
Frequently Asked Questions about NIST CSF 2.0: The 6 Core Functions – Govern, Identify, Protect, Detect, Respond, Recover
What are the 6 functions of the NIST Cybersecurity Framework 2.0?
NIST CSF 2.0 defines six core functions: Govern (GV), Identify (ID), Protect (PR), Detect (DE), Respond (RS) and Recover (RC). The Govern function was introduced in version 2.0 (February 2024) as the sixth function and forms the strategic center of the framework. Together, the six functions encompass
22 categories and
106 subcategories covering a complete cycle for cybersecurity management.
What does the new Govern function in NIST CSF 2.0 cover?
The Govern function (GV) establishes cybersecurity governance at the executive level. It encompasses
6 categories: Organizational Context (GV.OC), Risk Management Strategy (GV.RM), Roles and Responsibilities (GV.RR), Policy (GV.PO), Oversight (GV.OV) and Cybersecurity Supply Chain Risk Management (GV.SC). Govern sits at the center of the framework wheel because it informs how the organization implements all other five functions.
How does NIST CSF 2.0 differ from version 1.1?
The key changes: CSF 2.0 adds Govern as the sixth core function, applies to all organizations (not just critical infrastructure), consolidates to
106 subcategories (from 108), explicitly integrates supply chain risk management, and improves mappings to international standards like ISO 27001. Organizations with existing CSF 1.1 implementations should conduct a gap assessment to plan their migration.
What categories belong to Identify, Protect and Detect?
Identify covers Asset Management (ID.AM), Risk Assessment (ID.RA) and Improvement (ID.IM). Protect includes Identity Management and Access Control (PR.AA), Awareness and Training (PR.AT), Data Security (PR.DS), Platform Security (PR.PS) and Technology Infrastructure Resilience (PR.IR). Detect consists of Continuous Monitoring (DE.CM) and Adverse Event Analysis (DE.AE). Each category contains specific subcategories with measurable outcomes.
What do the Respond and Recover functions cover?
Respond (RS) includes Incident Management (RS.MA), Incident Analysis (RS.AN), Incident Response Reporting and Communication (RS.CO) and Incident Mitigation (RS.MI). Recover (RC) covers Recovery Plan Execution (RC.RP) and Incident Recovery Communication (RC.CO). Both functions activate during security incidents, with recovery insights feeding back into improving Protect and Detect capabilities.
How can NIST CSF 2.0 be aligned with DORA, NIS2 and ISO 27001?
NIST CSF 2.0 provides explicit mappings to international standards. Govern corresponds to DORA governance requirements (Art. 5‑6) and ISO 27001 leadership clauses (Ch. 5). Identify supports asset inventory requirements under NIS 2 Article 21. Detect and Respond cover DORA incident reporting obligations (Art. 17‑19). Recover addresses business continuity requirements across all three frameworks. An integrated compliance framework avoids duplicate assessments.
How do you start implementing the 6 CSF 2.0 functions?
Implementation begins with a maturity assessment across all six functions, evaluating current state using the NIST Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive). A Current Profile is then created and compared against the Target Profile. The gap analysis prioritizes measures by risk and cost-benefit ratio. Implementation proceeds in phases, typically starting with Govern and Identify as the foundation for all other functions.
Success Stories
Discover how we support companies in their digital transformation
Digitalization in Steel Trading
Klöckner & Co
Digital Transformation in Steel Trading

Results
AI-Powered Manufacturing Optimization
Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Results
AI Automation in Production
Festo
Intelligent Networking for Future-Proof Production Systems

Results
Generative AI in Manufacturing
Bosch
AI Process Optimization for Improved Production Efficiency

Results
Let's
Work Together!
Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
Ready for the next step?
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
Prefer direct contact?
Direct hotline for decision-makers
Strategic inquiries via email
Detailed Project Inquiry
For complex inquiries or if you want to provide specific information in advance