1 min read

NIST CSF 2.0 Baseline Now Available

NIST CSF 2.0 Baseline Now Available
NIST CSF 2.0 Baseline Now Available
2:12

We are pleased to announce the availability of the NIST CSF 2.0 Baseline on the CloudCapsule platform.

Partners and Clients can now compare assessment results against the NIST standard, clearly identifying areas that are compliant, and controls that may need improvement, whether that be a technical control or a policy element.

 

Understanding NIST CSF 2.0

The NIST Cybersecurity Framework (CSF) 2.0 is a comprehensive guide designed to help organizations manage and reduce cybersecurity risks. It provides a structured approach to identifying, assessing, and mitigating cybersecurity threats through a set of high-level outcomes and best practices.

The framework is adaptable to organizations of any size, sector, or maturity level, making it widely applicable across various industries. By using the NIST CSF 2.0, businesses can better understand their cybersecurity posture, prioritize their efforts, and communicate their strategies effectively.

This framework does not prescribe specific solutions but links to resources that offer detailed guidance on achieving desired cybersecurity outcomes, thereby enhancing overall resilience and security.

 
Getting Started with the NIST Baseline

Follow these simple steps to use the NIST CSF 2.0 Baseline in your assessments.

  • Login to CloudCapsule and choose the tenant or run a new assessment by entering the domain or tenant ID
  • Once the scan completes, click on Baselines on the navigation menu
  • Choose NIST CSF from the Baseline choices above the radar graph

NIST Radar Graph

 
Overview of NIST Functions

Scroll down to review the NIST Overview and click on any gauge or individual pass/fail/assumed risk indicator for more detailed information.

NIST Overview Screen

 
Review Individual Control Details

Simply click on an individual control for more information on results, suggested remediation, and impacted elements.

NIST Control

 
Augment Compliance

Augment the controls with your own evidence, 3rd party coverage, and/or assumed risk.

NIST Augmentation

 
Learn More

For more information on NIST, please see the following links:

 https://www.nist.gov/cyberframework

 https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-csf-20/final

vCIO Playbook - BEC - Business Email Compromise

5 min read

vCIO Playbook - BEC - Business Email Compromise

Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...

Read More
Protecting Corporate Data on Personal Cell Phones

4 min read

Protecting Corporate Data on Personal Cell Phones

If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management,...

Read More
What’s New in Microsoft 365 | March Updates

15 min read

What’s New in Microsoft 365 | March Updates

Microsoft Teams

Read More