Skip to content

NIST CSF Assessment SOP

Standard Operating Procedure for NIST Cybersecurity Framework assessments

Service Pillar: Protect Service Category: Security Assessment Target Duration: 3-4 weeks Related Pricing: See Pricing & Positioning


Service Overview

Purpose

Conduct comprehensive assessments against the NIST Cybersecurity Framework (CSF) 2.0 to evaluate security maturity, identify gaps, and develop prioritized improvement roadmaps.

Target Personas

Persona Primary Pain Point Value Case
Solo IT Director Need a structured security approach Industry-standard security framework
CFO/Controller Security investment prioritization Risk-based security spending
CTO/VP Engineering Security maturity demonstration Provable security posture for customers

Business Justification

Metric Value Source
Organizations using NIST CSF 50%+ of US organizations NIST CSF Adoption Study 2024
Cost savings with risk-based security 20-40% efficiency NIST CSF Implementation Studies
Average breach cost without framework $5.36 million IBM 2024
Average breach cost with framework $4.10 million IBM 2024
Organizations reporting improved risk management 78% ISACA CSF Survey

Pricing Reference

Tier Scope Price Range Duration
Essential <50 employees, basic assessment $12,000-$18,000 2-3 weeks
Standard 50-200 employees, full assessment $18,000-$25,000 3-4 weeks
Comprehensive 200+ employees, detailed maturity $25,000-$40,000 4-5 weeks

See Pricing & Positioning for complete pricing structure.


Pre-Engagement

Qualification Checklist

  • Security leadership sponsor identified
  • Assessment scope defined
  • Prior assessments available
  • Key stakeholders available for interviews
  • Current security documentation accessible
  • Organizational risk appetite understood

Required Information Gathering

Category Documents Needed
Organizational Org chart, business units, locations
Security Existing policies, procedures, architecture
Technology Asset inventory, network diagrams, tools
Compliance Regulatory requirements, existing frameworks
Risk Previous risk assessments, incident history

NIST CSF 2.0 Framework

Core Functions

Function Focus Key Outcomes
GOVERN (GV) Organizational context, strategy, supply chain Cybersecurity strategy, roles, policy
IDENTIFY (ID) Asset management, risk assessment, improvement Known assets, understood risks
PROTECT (PR) Access control, awareness, data security Safeguards in place
DETECT (DE) Continuous monitoring, anomaly detection Timely detection capability
RESPOND (RS) Response planning, communications, analysis Effective incident response
RECOVER (RC) Recovery planning, improvements Business continuity

CSF 2.0 Category Structure

GOVERN (New in CSF 2.0)

Category ID Focus
Organizational Context GV.OC Mission, stakeholders, legal/regulatory
Risk Management Strategy GV.RM Risk appetite, strategy, priorities
Roles, Responsibilities, Authorities GV.RR Accountability, governance
Policy GV.PO Policy establishment and communication
Oversight GV.OV Review and adjustment of strategy
Cybersecurity Supply Chain Risk Management GV.SC Supplier and third-party risk

IDENTIFY

Category ID Focus
Asset Management ID.AM Physical, software, data assets
Risk Assessment ID.RA Threat, vulnerability, risk analysis
Improvement ID.IM Lessons learned, improvements

PROTECT

Category ID Focus
Identity Management, Authentication, Access Control PR.AA Access management, MFA
Awareness and Training PR.AT Security awareness
Data Security PR.DS Data protection, encryption
Platform Security PR.PS Configuration, patching
Technology Infrastructure Resilience PR.IR Redundancy, resilience

DETECT

Category ID Focus
Continuous Monitoring DE.CM Monitoring activities
Adverse Event Analysis DE.AE Event analysis, alerting

RESPOND

Category ID Focus
Incident Management RS.MA Response procedures
Incident Analysis RS.AN Investigation, root cause
Incident Response Reporting and Communication RS.CO Stakeholder communication
Incident Mitigation RS.MI Containment and eradication

RECOVER

Category ID Focus
Incident Recovery Plan Execution RC.RP Recovery procedures
Incident Recovery Communication RC.CO Recovery communication

Assessment Process

Phase 1: Scoping and Planning (Days 1-3)

Objective: Establish assessment scope and approach

Activity Deliverable Duration
Kickoff meeting Aligned expectations 0.5 day
Scope definition Assessment scope document 0.5 day
Stakeholder identification Interview schedule 0.5 day
Document request Information request list 0.5 day
Current profile draft Preliminary profile 0.5 day

Phase 2: Current State Assessment (Days 4-12)

Objective: Evaluate current cybersecurity posture

Activity Deliverable Duration
GOVERN function assessment Governance findings 1.5 days
IDENTIFY function assessment Asset/risk findings 1.5 days
PROTECT function assessment Safeguard findings 2 days
DETECT function assessment Monitoring findings 1 day
RESPOND function assessment Response findings 1 day
RECOVER function assessment Recovery findings 0.5 day
Technical validation Technical verification 1 day

Assessment Approach by Function

GOVERN Assessment: - Interview senior leadership on risk appetite - Review organizational security strategy - Evaluate policy framework completeness - Assess supply chain risk management

IDENTIFY Assessment: - Review asset management processes - Evaluate risk assessment methodology - Assess improvement/lessons learned process

PROTECT Assessment: - Evaluate access control implementation - Review security awareness program - Assess data protection controls - Review platform security configurations

DETECT Assessment: - Review monitoring capabilities - Evaluate alerting and triage processes - Assess detection coverage

RESPOND Assessment: - Review incident response plan - Evaluate response procedures - Assess communication protocols

RECOVER Assessment: - Review business continuity plans - Evaluate recovery procedures - Assess recovery testing

Phase 3: Gap Analysis (Days 12-16)

Objective: Identify gaps between current and target state

Activity Deliverable Duration
Target profile development Target maturity profile 1 day
Gap identification Gap matrix 1 day
Prioritization Priority assessment 1 day
Remediation planning Action plan draft 1 day

Phase 4: Reporting (Days 16-22)

Objective: Document findings and recommendations

Activity Deliverable Duration
Report drafting Draft assessment report 2 days
Internal QA Quality review 1 day
Client review Feedback incorporation 2 days
Final delivery Complete CSF assessment 1 day

Maturity Rating Methodology

Implementation Tiers

Tier Name Characteristics
Tier 1 Partial Ad-hoc, reactive, limited awareness
Tier 2 Risk Informed Risk-aware but not organization-wide
Tier 3 Repeatable Documented policies, regular review
Tier 4 Adaptive Continuous improvement, metrics-driven

Category Maturity Scoring

Score Definition Characteristics
0 Not Implemented No capability exists
1 Initial Ad-hoc, undocumented
2 Developing Partially documented, inconsistent
3 Defined Documented, consistently applied
4 Managed Measured, performance tracked
5 Optimizing Continuously improved

Deliverables

NIST CSF Assessment Report

Structure:

  1. Executive Summary
  2. Assessment scope and approach
  3. Overall maturity score
  4. Key findings summary
  5. Priority recommendations

  6. Current Profile

  7. Function-by-function assessment
  8. Category maturity ratings
  9. Implementation tier assessment

  10. Target Profile

  11. Recommended target maturity
  12. Business justification
  13. Risk-based prioritization

  14. Gap Analysis

  15. Current vs target comparison
  16. Gap severity ratings
  17. Remediation complexity

  18. Improvement Roadmap

  19. Prioritized action items
  20. Quick wins (0-90 days)
  21. Short-term (90-180 days)
  22. Long-term (180+ days)
  23. Resource estimates

  24. Implementation Guidance

  25. Function-specific recommendations
  26. Tool and technology suggestions
  27. Process improvements

CSF Profile Visualization

                    Current Profile vs Target Profile

GOVERN      ████████████░░░░░░░░  60% → 80%
IDENTIFY    ██████████░░░░░░░░░░  50% → 75%
PROTECT     ████████████████░░░░  80% → 90%
DETECT      ██████░░░░░░░░░░░░░░  30% → 70%
RESPOND     ████████░░░░░░░░░░░░  40% → 75%
RECOVER     ████░░░░░░░░░░░░░░░░  20% → 60%

Quality Assurance

Internal Review Checklist

  • All 6 functions assessed
  • All categories evaluated
  • Maturity ratings consistent
  • Recommendations actionable
  • Target profile justified
  • Roadmap realistic
  • Business context reflected

Client Review Process

  1. Draft report delivery
  2. 5 business day review period
  3. Profile review workshop
  4. Final report delivery
  5. Roadmap planning session

Post-Delivery

Implementation Support Options

Option Scope Investment
Self-Implementation Report + templates only Included
Quarterly Reviews Progress tracking, priority updates $3,000-$5,000/quarter
vCISO Integration Full program management vCISO pricing

Ongoing CSF Management

Activity Frequency Purpose
Profile review Annual Reassess maturity
Gap status update Quarterly Track remediation
Risk landscape review Semi-annual Update threat context
Target profile review Annual Adjust objectives

Service Connection SOP Reference
Risk Assessment Aligns with ID.RA risk-assessment-sop.md
Penetration Testing Validates controls pentest-sop.md
Incident Response RS function support incident-response-sop.md
vCISO Ongoing CSF management vcto-vciso-engagement-sop.md

Evidence Base

Why This Approach Works

Principle Evidence Source
CSF provides common language Industry-standard framework adopted globally NIST
Risk-based approach effective 24% lower breach cost with framework IBM 2024
Maturity model drives improvement Measurable progress tracking ISACA
Profile-based approach Tailored to organizational needs NIST CSF 2.0

SBK Success Metrics

Metric Target Measurement
Maturity improvement 1+ tier in 12 months Follow-up assessment
Client satisfaction 4.5+/5.0 Post-engagement survey
Roadmap adoption rate 80%+ 12-month follow-up
Repeat engagement rate 60%+ Annual return

Regulatory References


Last Updated: February 2026 Version: 1.0