NIST CSF Worksheet
NIST CSF Worksheet
NIST CSF Worksheet
3.3
3.0 3.0
2.8
2.7 2.6
2.3 2.3
2.2 2.2 2.2
2.0 2.0
1.8
1.3
0.8
0.3
Editing this shape or saving this workbook into a different file format will
permanently break the chart.
NIST CSF Scores Breakdown
Current Maturity Target
Communications
2.0
Response Planning
2.0 2.2
2.7 2.6
Communications
Improvements
Maintenc
Supply Chain RM
2.0
Data Security
Info Protection
Maintence
Protective Tech
and Events
Asset Management (ID.AM)
ID.AM-1: Physical devices and systems within the organization are inventoried
ID.AM-2: Software platforms and applications within the organization are inventoried
ID.AM-3: Organizational communication and data flows are mapped
ID.AM-4: External information systems are catalogued
ID.AM-5: Resources (e.g., hardware, devices, data, time, and software) are prioritized based on their classification,
ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., supplier
Business Environment (ID.BE)
ID.BE-1: The organization’s role in the supply chain is identified and communicated
ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated
ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated
ID.BE-4: Dependencies and critical functions for delivery of critical services are established
ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g.
Governance (ID.GV)
ID.GV-1: Organizational information security policy is established
ID.GV-2: Information security roles & responsibilities are coordinated and aligned with internal roles and external pa
ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations,
ID.GV-4: Governance and risk management processes address cybersecurity risks
Risk Assessment (ID.RA)
ID.RA-1: Asset vulnerabilities are identified and documented
ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources
ID.RA-3: Threats, both internal and external, are identified and documented
ID.RA-4: Potential business impacts and likelihoods are identified
ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
ID.RA-6: Risk responses are identified and prioritized
Risk Management Strategy (ID.RA)
ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders
ID.RM-2: Organizational risk tolerance is determined and clearly expressed
ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector
Supply Chain Management (ID.SC)
ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed, and agre
ID.SC-2: Identify, prioritize and assess suppliers and third-party partners of information systems, components and s
ID.SC-3: Suppliers and 3rd-party partners are required by contract to implement appropriate measures designed to
Chain Risk Management Plan
ID.SC-4: Suppliers and 3rd-party partners are routinely assessed to confirm that they are meeting their contractual o
equivalent evaluations of suppliers/providers are conducted
ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers
Current Maturity Target Maturity Summary Average
1
2
2
2
3 1.7
2
1
Current Maturity Target Maturity Summary Average
0
2
3 3 1.4
2
0
Current Maturity Target Maturity Summary Average
3
4
2
3 2.5
1
Current Maturity Target Maturity Summary Average
3
3
3
3
3 2.3
1
1
Current Maturity Target Maturity Summary Average
1
1 3 1.0
1
Current Maturity Target Maturity Summary Average
3
3
3
3 3.0
3
2
3
3
2
3 2 2.7
2
3
2
4
4
2
Current Maturity Target Maturity Summary Average
2
2
2 2.0
Current Maturity Target Maturity Summary Average
2
2
2 3 2.0
3 2.0
2
2
Improvements (RC.IM)
RC.IM-1: Recovery plans incorporate lessons learned
RC.IM-2: Recovery strategies are updated
Communications (RC.CO)
RC.CO-1: Public relations are managed
RC.CO-2: Reputation after an event is repaired
RC.CO-3: Recovery activities are communicated to internal stakeholders and executive and management teams
Current Maturity Target Maturity Summary Average
2 2 2.0
Current Maturity Target Maturity Summary Average
2
2
3 2.0
Current Maturity Target Maturity Summary Average
2
2 3 2.0
2
Maturity Target
Identify 2.0 3.0
Protect 2.2 2.3 Asset Mgmt
Detect 2.2 3.0 Bus. Environment
Recover 2.0 2.7 Governance
Respond 2.2 2.6 Risk Assessment
Risk Mgmt. Strategy
Supply Chain RM
Identity Mgt
Awareness and Training
Data Security
Info Protection
Maintence
Protective Tech
Recovery Planning
Improvements
Communications
Response Planning
Communications
Analysis
Mitigation
Improvements
Current Maturity Target
1.7 3.0
1.4 3.0
2.5 3.0
2.3 3.0
1.0 3.0
3.0 3.0
2.1 2.0
2.0 3.0
2.5 2.0
2.7 2.0
2.0 2.0
2.0 3.0
2.1 3.0
2.0 3.0
2.5 3.0
2.0 2.0
2.0 3.0
2.0 3.0
2.0 3.0
2.0 3.0
2.8 3.0
2.3 2.0
2.0 2.0