NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
October 18, 2018

NIST Cybersecurity Framework Version 1.1 Changes

NuHarbor Security

With recent updates to the NIST Cybersecurity Framework (CSF), it's a good time to revisit the framework, highlight the advantages to leveraging it, and discuss what these changes may result in going forward.

Before jumping into the updates, let’s cover some background. The NIST CSF was originally released on February 12, 2014, in response to Executive Order 13636, “Improving Critical Infrastructure Cybersecurity," from 2013. Since then, it's become an invaluable tool for helping private and public sector organizations manage and address cybersecurity risk both domestically and abroad.

One of the best features of the framework is that it’s industry agnostic. While it can easily be mapped to requirements for highly regulated industries (e.g., government, financial services, healthcare, etc.), it can also be implemented and used by any firm seeking a tangible way to measure their cybersecurity posture.

NIST Cybersecurity Framework Version 1.1

Published on April 16, 2018, NIST CSF Version 1.1 is the first revision to the framework since it was released. In total, 10 additional subcategories were added for a total of 108 subcategories.

From a high level, Version 1.1 includes updates to:

  • Authentication and identity
  • Self-assessing cybersecurity risk
  • Managing cybersecurity within the supply chain
  • Vulnerability disclosure

As part of the updates, NIST inserted a list of changes which can be found on page ii of the framework. Highlighted below are noteworthy impacts of these changes:

Major Changes

  1. “Clarified that terms like “compliance” can be confusing and mean something very different to various Framework stakeholders. Added clarity that the Framework has utility as a structure and language for organizing and expressing compliance with an organization’s own cybersecurity requirements. However, the variety of ways in which the Framework can be used by an organization means that phrases like “compliance with the Framework” can be confusing.”

Impact: While straightforward, this update goes a long way to help streamline the implementation. The CSF can be leveraged as a framework to allow firms to present compliance (or non-compliance) with their own organizationally-defined cybersecurity requirements (which may be informed by industry-specific regulatory requirements). Its primary purpose is not regulatory compliance (e.g., 23 NYCRR 500, NIST 800-53, HIPAA Security Rule, etc.) and “compliance” with CSF should not be interpreted as compliance with any specific regulatory mandate.

Self-Assessment

  1. “Added new section on self-assessment. Added Section 4.0 Self-Assessing Cybersecurity Risk with the Framework to explain how the Framework can be used by organizations to understand and assess their cybersecurity risk, including the use of measurements.”

Impact: NuHarbor has always recommended self-assessment to address organizational risk and compliance. A common challenge that keeps many organizations from getting started with self-assessments is a lack of existing internal resources. The updated version of the CSF contains an addition of more explicit self-assessment guidance that should enable even more organizations to begin effectively leveraging the framework.

Expansion of Framework for Cyber Supply Chain Risk Management

  1. “Greatly expanded explanation of using Framework for Cyber Supply Chain Risk Management purposes. An expanded Section 3.3 Communicating Cybersecurity Requirements with Stakeholders helps users better understand Cyber Supply Chain Risk Management (SCRM), while a new Section 3.4 Buying Decisions highlights use of the Framework in understanding risk associated with commercial off-the-shelf products and services. Additional Cyber SCRM criteria were added to the Implementation Tiers. Finally, a Supply Chain Risk Management Category, including multiple Subcategories, has been added to the Framework Core.”

Impact: These enhancements all relate to the cyber supply chain, an area that many firms take for granted by assuming suppliers follow widespread security practices. While not a huge change, these updates should make it easier to implement controls to address cyber supply chain risks.

Access Control Language Refinement

  1. “Refinements to better account for authentication, authorization, and identity proofing. The language of the Access Control Category has been refined to better account for authentication, authorization, and identity proofing. This included adding one Subcategory each for Authentication and Identity Proofing. Also, the Category has been renamed to Identity Management and Access Control (PR.AC) to better represent the scope of the Category and corresponding Subcategories.”

Impact: These changes are mostly form versus substance, and should make discussion related to the Access Control Category more straightforward as the subcategories are more explicit.

Explanation of Implementation Tiers and Profiles

  1. “Better explanation of the relationship between Implementation Tiers and Profiles. Added language to Section 3.2 Establishing or Improving a Cybersecurity Program on using Framework Tiers in Framework implementation. Added language to Framework Tiers to reflect integration of Framework considerations within organizational risk management programs. The Framework Tier concepts were also refined. Updated Figure 2.0 to include actions from the Framework Tiers.”

Impact: One of the most common causes for confusion with the framework are implementation tiers versus profiles. A tier is the degree or level of sophistication a firm has decided to dedicate to cybersecurity risk management. They help to determine the extent to which cybersecurity risk management is informed by business needs and set the tone for how cybersecurity risk will be managed within the organization. In contrast, a profile can be thought of as a score card, factoring in how aligned the functions, categories, and associated subcategories presented in the framework are with the business requirements, risk tolerance, and resources of the organization. A current profile can be assessed and then compared to target profile to help identify gaps and prioritize action plans to address them. These enhancements should make this delineation more intuitive.

Vulnerability Disclosure Lifecycle Subcategory Addition

  1. “Consideration of Coordinated Vulnerability Disclosure. A Subcategory related to the vulnerability disclosure lifecycle was added.”

Impact: At face value, this is another straightforward change, however, what good is receiving notifications/disclosures of vulnerabilities if no process is in place to address them? While this may seem intuitive, the addition of this category will help ensure enough resources can be applied to receiving and addressing vulnerabilities from disclosure notifications.

Conclusion

While the changes to the framework are not revolutionary, they continue to strengthen the NIST CSF as the framework of choice for cybersecurity. Whether you are looking to implement the NIST CSF for the first time, or have adopted the framework years ago, there’s no reason not to start leveraging the latest version of the framework going forward.

Interested in a cybersecurity assessment? We offer customized assessment services against various frameworks. For information on our NIST Cybersecurity Framework assessment services, click here. For information on our NIST 800-53 assessment services, click here.

Check out the source document: NIST Cybersecurity Framework Draft 1.1

 

Included Topics

  • Compliance

Related Posts

Compliance 6 min read
Quickstart Guide: NIST Cybersecurity Framework Read More
Compliance 4 min read
Which Security Controls Framework Is Right for You? Read More
Security Operations 2 min read
2 Questions to Determine if a Security Program Review or Security Assessment is Better for Your Company Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.