Govern, Identify, Protect, Detect, Respond, Recover – the complete NIST Cybersecurity Framework 2.0

NIST CSF 2.0: The 6 Core Functions – Govern, Identify, Protect, Detect, Respond, Recover

The NIST Cybersecurity Framework 2.0 defines six core functions for effective cybersecurity management. With the new Govern function, CSF 2.0 places strategic oversight at the center. We support you in implementing all six functions – from governance through detection to recovery.

  • All 6 NIST CSF 2.0 core functions covered – including the new Govern function
  • Structured implementation from governance through recovery
  • Integration with DORA, NIS2 and ISO 27001 requirements
  • Measurable improvement in cybersecurity resilience and compliance

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

The 6 NIST CSF 2.0 Core Functions Explained

Our Expertise

  • Deep experience with NIST CSF 2.0 and all 6 core functions
  • Proven implementation methodology in regulated industries (finance, energy, healthcare)
  • Holistic approach: governance, technology and organizational change
  • Experience integrating CSF 2.0 into existing ISMS structures

Important: NIST CSF 2.0 replaces 1.1

Since February 2024, NIST CSF 2.0 is the current version. The key update is the sixth function Govern, which establishes cybersecurity governance as a strategic leadership responsibility. Organizations should update existing CSF implementations to version 2.0.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

We follow a structured approach to implementing all six NIST CSF 2.0 core functions, ensuring both technical excellence and strategic alignment.

Our Approach:

GOVERN Phase: Establishing cybersecurity governance, risk strategy and policies at the leadership level

IDENTIFY Phase: Comprehensive asset inventory, risk assessment and dependency analysis

PROTECT Phase: Implementation of access controls, data security and security training

DETECT Phase: Building continuous monitoring, anomaly detection and threat analysis

RESPOND Phase: Development of structured incident response processes and communication plans

RECOVER Phase: Establishing robust recovery processes and business continuity measures

"The systematic implementation of all five NIST CSF core functions with ADVISORI has fundamentally transformed our cybersecurity architecture. The comprehensive approach and structured execution have enabled us to develop a truly resilient and adaptive cybersecurity posture that not only minimizes risks but also enables business growth."
Sarah Richter

Sarah Richter

Head of Information Security, Cyber Security

Expertise & Experience:

10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security

Our Services

We offer you tailored solutions for your digital transformation

IDENTIFY & PROTECT Implementation

Complete implementation of the Identify and Protect functions with comprehensive asset management and safeguards.

  • Comprehensive asset management and inventory
  • Risk assessment and business environment analysis
  • Governance structures and risk management strategies
  • Access controls, data protection, and awareness programs

DETECT, RESPOND & RECOVER Implementation

Building advanced detection capabilities and structured response and recovery processes.

  • Continuous security monitoring and anomaly detection
  • Security Operations Center (SOC) and detection engineering
  • Incident response plans and communication strategies
  • Business continuity and disaster recovery planning

Our Competencies in NIST Cybersecurity Framework

Choose the area that fits your requirements

NIST Integration

Integrating the NIST Cybersecurity Framework with existing standards like ISO 27001, BSI IT-Grundschutz, or DORA requires strategic planning and deep expertise. We handle the mapping, harmonization, and sustainable embedding in your organization.

NIST Maturity Assessment Roadmap

A thorough maturity assessment based on the NIST Cybersecurity Framework 2.0 reveals exactly where your organization stands across all four implementation tiers and which steps lead to the next level. We develop data-driven roadmaps that systematically and measurably elevate your cybersecurity maturity – from baseline analysis through gap assessment to prioritized implementation.

Frequently Asked Questions about NIST CSF 2.0: The 6 Core Functions – Govern, Identify, Protect, Detect, Respond, Recover

What are the 6 functions of the NIST Cybersecurity Framework 2.0?

NIST CSF 2.0 defines six core functions: Govern (GV), Identify (ID), Protect (PR), Detect (DE), Respond (RS) and Recover (RC). The Govern function was introduced in version 2.0 (February 2024) as the sixth function and forms the strategic center of the framework. Together, the six functions encompass

22 categories and

106 subcategories covering a complete cycle for cybersecurity management.

What does the new Govern function in NIST CSF 2.0 cover?

The Govern function (GV) establishes cybersecurity governance at the executive level. It encompasses

6 categories: Organizational Context (GV.OC), Risk Management Strategy (GV.RM), Roles and Responsibilities (GV.RR), Policy (GV.PO), Oversight (GV.OV) and Cybersecurity Supply Chain Risk Management (GV.SC). Govern sits at the center of the framework wheel because it informs how the organization implements all other five functions.

How does NIST CSF 2.0 differ from version 1.1?

The key changes: CSF 2.0 adds Govern as the sixth core function, applies to all organizations (not just critical infrastructure), consolidates to

106 subcategories (from 108), explicitly integrates supply chain risk management, and improves mappings to international standards like ISO 27001. Organizations with existing CSF 1.1 implementations should conduct a gap assessment to plan their migration.

What categories belong to Identify, Protect and Detect?

Identify covers Asset Management (ID.AM), Risk Assessment (ID.RA) and Improvement (ID.IM). Protect includes Identity Management and Access Control (PR.AA), Awareness and Training (PR.AT), Data Security (PR.DS), Platform Security (PR.PS) and Technology Infrastructure Resilience (PR.IR). Detect consists of Continuous Monitoring (DE.CM) and Adverse Event Analysis (DE.AE). Each category contains specific subcategories with measurable outcomes.

What do the Respond and Recover functions cover?

Respond (RS) includes Incident Management (RS.MA), Incident Analysis (RS.AN), Incident Response Reporting and Communication (RS.CO) and Incident Mitigation (RS.MI). Recover (RC) covers Recovery Plan Execution (RC.RP) and Incident Recovery Communication (RC.CO). Both functions activate during security incidents, with recovery insights feeding back into improving Protect and Detect capabilities.

How can NIST CSF 2.0 be aligned with DORA, NIS2 and ISO 27001?

NIST CSF 2.0 provides explicit mappings to international standards. Govern corresponds to DORA governance requirements (Art. 5‑6) and ISO 27001 leadership clauses (Ch. 5). Identify supports asset inventory requirements under NIS 2 Article 21. Detect and Respond cover DORA incident reporting obligations (Art. 17‑19). Recover addresses business continuity requirements across all three frameworks. An integrated compliance framework avoids duplicate assessments.

How do you start implementing the 6 CSF 2.0 functions?

Implementation begins with a maturity assessment across all six functions, evaluating current state using the NIST Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive). A Current Profile is then created and compared against the Target Profile. The gap analysis prioritizes measures by risk and cost-benefit ratio. Implementation proceeds in phases, typically starting with Govern and Identify as the foundation for all other functions.

Success Stories

Discover how we support companies in their digital transformation

Digitalization in Steel Trading

Klöckner & Co

Digital Transformation in Steel Trading

Case Study
Digitalisierung im Stahlhandel - Klöckner & Co

Results

Over 2 billion euros in annual revenue through digital channels
Goal to achieve 60% of revenue online by 2022
Improved customer satisfaction through automated processes

AI-Powered Manufacturing Optimization

Siemens

Smart Manufacturing Solutions for Maximum Value Creation

Case Study
Case study image for AI-Powered Manufacturing Optimization

Results

Significant increase in production performance
Reduction of downtime and production costs
Improved sustainability through more efficient resource utilization

AI Automation in Production

Festo

Intelligent Networking for Future-Proof Production Systems

Case Study
FESTO AI Case Study

Results

Improved production speed and flexibility
Reduced manufacturing costs through more efficient resource utilization
Increased customer satisfaction through personalized products

Generative AI in Manufacturing

Bosch

AI Process Optimization for Improved Production Efficiency

Case Study
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Results

Reduction of AI application implementation time to just a few weeks
Improvement in product quality through early defect detection
Increased manufacturing efficiency through reduced downtime

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance