Skip to main content
Good Security

Compliance

NIST Cybersecurity Framework

A globally recognised cybersecurity framework that provides a common language and structured approach to managing cyber risk across organisations of all sizes.

NIST Cybersecurity Framework (CSF) 2.0

What is really being asked of the business

What this requirement is trying to protect in the real world

A good compliance programme starts by understanding the business purpose behind the requirement rather than treating it like a checklist.

The NIST Cybersecurity Framework (CSF) is developed by the U.S. National Institute of Standards and Technology and has become one of the most widely adopted cybersecurity frameworks globally. Version 2.0, released in February 2024, expanded the framework from five to six core functions — Govern, Identify, Protect, Detect, Respond, and Recover — adding explicit governance as a foundation for effective cybersecurity. The CSF provides a common language for understanding, managing, and communicating cybersecurity risk, making it valuable for both technical teams and business leaders.

The framework is intentionally outcome-focused rather than prescriptive. It describes what good cybersecurity looks like without dictating specific technologies or solutions, allowing organisations to tailor their approach to their specific risk profile, resources, and business context. This flexibility makes the NIST CSF particularly useful for New Zealand businesses that need a structured approach to cybersecurity but cannot adopt the full weight of more prescriptive frameworks like NZISM.

For New Zealand organisations, the NIST CSF serves multiple purposes. It provides an excellent foundation for building a cybersecurity programme from scratch, a structured way to assess and improve an existing programme, and a recognised reference point for communicating security position to your team, customers, and partners. The framework's alignment with international standards — including ISO 27001 and CIS Controls — means that investments in NIST CSF alignment directly support other compliance objectives.

Why It Matters

Why business owners, customers, and boards pay attention to it.

The NIST CSF is increasingly referenced by New Zealand organisations, particularly those working with international partners or operating in sectors where demonstrating cybersecurity maturity is a business requirement. Its common language and structured approach make it an excellent communication tool — enabling security teams to report risk in terms that boards, executives, and non-technical leadership can understand and act upon.

The addition of the Govern function in CSF 2.0 reflects a critical reality: effective cybersecurity requires executive engagement, clear accountability, and integration with enterprise risk management. For New Zealand businesses where security governance is often informal or ad hoc, the NIST CSF provides a practical roadmap for establishing the governance structures that underpin a sustainable security programme.

International business relationships increasingly reference the NIST CSF. Organisations exporting services or products, working with multinational partners, or operating in regulated sectors may encounter NIST CSF alignment requirements in supplier assessments and due diligence processes. Demonstrating alignment with a globally recognised framework removes friction from these business relationships and positions your organisation as a security-mature partner.

Key Requirements

The obligations most businesses need translated into operating reality.

This is where the framework turns into documented controls, ownership, evidence, and review cycles.

See key requirements
01

Govern (GV)

Establish and monitor the organisation's cybersecurity risk management strategy, expectations, and policy. This includes defining organisational context, risk management strategy, roles and responsibilities, policies, and oversight mechanisms.

02

Identify (ID)

Understand the organisation's current cybersecurity risks by identifying assets, business environment, governance structures, risk assessments, and supply chain risk management requirements.

03

Protect (PR)

Implement appropriate safeguards to support delivery of critical services. This covers identity management, access control, awareness and training, data security, platform security, and technology infrastructure resilience.

04

Detect (DE)

Develop and implement appropriate activities to identify the occurrence of a cybersecurity event in a timely manner. This includes continuous monitoring and analysis of security events.

05

Respond (RS)

Develop and implement appropriate activities to take action regarding a detected cybersecurity incident. This includes incident management, analysis, reporting, and mitigation.

06

Recover (RC)

Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

How Good Security Helps

Where businesses usually need practical support.

This is about building the policies, registers, evidence, and governance needed to stand up to scrutiny.

Further Reading

Related guidance for teams that need the detail.

These articles go deeper into the surrounding decisions, timelines, and implementation issues.

FAQ

Common commercial questions.

What's new in NIST CSF 2.0? +

The most significant change in CSF 2.0 is the addition of the Govern function as a sixth core function, elevating cybersecurity governance to the same level as technical controls. The framework also expanded its scope beyond critical infrastructure to explicitly address organisations of all sizes and sectors, improved supply chain risk management guidance, and enhanced the alignment with other frameworks and standards. For New Zealand businesses, the governance emphasis is particularly relevant as it provides a structured approach to the executive oversight and accountability that underpin effective security programmes.

Is NIST CSF mandatory in New Zealand? +

The NIST CSF is not mandatory in New Zealand. However, it is widely referenced as a best-practice framework and is increasingly encountered in supplier assessments, customer due diligence processes, and cyber insurance applications. Many New Zealand organisations use the NIST CSF as their primary cybersecurity framework because of its flexibility, global recognition, and practical applicability to organisations of all sizes. Good Security helps clients adopt the NIST CSF in a way that simultaneously supports NZ-specific requirements like NZISM and the Privacy Act.

How does NIST CSF relate to ISO 27001? +

The NIST CSF and ISO 27001 are complementary. The NIST CSF provides a high-level, outcome-focused framework for organising and improving cybersecurity activities, while ISO 27001 provides a certifiable management system for information security. There is substantial alignment — NIST CSF categories map well to ISO 27001 Annex A controls, and the NIST CSF Govern function aligns closely with ISO 27001's management system requirements. Good Security's cross-framework mapping means that progress toward one framework directly supports the other.

How long does it take to align with NIST CSF? +

Initial alignment — establishing baseline maturity scores, identifying gaps, and building an improvement roadmap — can typically be completed within the first two to three months of engagement. Achieving target maturity levels across all six functions is an ongoing process that depends on your starting point, the maturity targets appropriate for your organisation, and the resources available for implementation. Good Security's structured approach helps you see measurable improvement from the first month.

Most businesses managing NIST Cybersecurity Framework (CSF) 2.0 obligations start with Assurance.

If you are weighing up fit, scope, or urgency, start with the scorecard for a fast benchmark and book a consultation when you need a practical next-step plan.