performing-nist-csf-maturity-assessment

The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions - Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF using Implementation Tiers to measure organizational cybersecurity posture and create improvement roadmaps.

16 stars

Best use case

performing-nist-csf-maturity-assessment is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions - Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF using Implementation Tiers to measure organizational cybersecurity posture and create improvement roadmaps.

Teams using performing-nist-csf-maturity-assessment should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/performing-nist-csf-maturity-assessment/SKILL.md --create-dirs "https://raw.githubusercontent.com/plurigrid/asi/main/plugins/asi/skills/performing-nist-csf-maturity-assessment/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/performing-nist-csf-maturity-assessment/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How performing-nist-csf-maturity-assessment Compares

Feature / Agentperforming-nist-csf-maturity-assessmentStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions - Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF using Implementation Tiers to measure organizational cybersecurity posture and create improvement roadmaps.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Performing NIST CSF Maturity Assessment

## Overview
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF, using the four Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive) to measure organizational cybersecurity posture and create improvement roadmaps.


## When to Use

- When conducting security assessments that involve performing nist csf maturity assessment
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing

## Prerequisites
- Understanding of cybersecurity risk management principles
- Access to NIST CSF 2.0 documentation and reference tool
- Knowledge of organizational IT/OT environment and security controls
- Stakeholder access across business units for assessment interviews

## Core Concepts

### CSF 2.0 Functions (6 Functions, 22 Categories)

| Function | Code | Categories | Purpose |
|----------|------|-----------|---------|
| **Govern** | GV | 6 | Establish and monitor cybersecurity risk management strategy |
| **Identify** | ID | 3 | Determine current cybersecurity risk to the organization |
| **Protect** | PR | 5 | Implement safeguards to prevent or reduce risk |
| **Detect** | DE | 2 | Find and analyze possible cybersecurity attacks |
| **Respond** | RS | 4 | Take action regarding detected cybersecurity incidents |
| **Recover** | RC | 2 | Restore capabilities impaired by cybersecurity incidents |

### Govern Function (New in CSF 2.0)
- GV.OC: Organizational Context
- GV.RM: Risk Management Strategy
- GV.RR: Roles, Responsibilities, and Authorities
- GV.PO: Policy
- GV.OV: Oversight
- GV.SC: Cybersecurity Supply Chain Risk Management

### Implementation Tiers
| Tier | Name | Description |
|------|------|-------------|
| Tier 1 | Partial | Ad hoc, reactive; limited awareness of cybersecurity risk |
| Tier 2 | Risk-Informed | Risk-aware but not organization-wide; approved but may not be policy |
| Tier 3 | Repeatable | Formal policies; consistently implemented; regularly updated |
| Tier 4 | Adaptive | Continuous improvement; real-time risk response; lessons learned integrated |

## Workflow

### Phase 1: Scoping and Preparation (Weeks 1-2)
1. Define assessment scope (enterprise-wide vs. business unit)
2. Identify stakeholders and schedule interviews
3. Gather existing documentation (policies, procedures, architecture diagrams)
4. Customize CSF Profile for organizational context
5. Select assessment methodology (self-assessment, facilitated, third-party)

### Phase 2: Current State Assessment (Weeks 3-6)
1. Assess each CSF Category and Subcategory against Implementation Tiers
2. For each subcategory, evaluate:
   - Policy/documentation maturity
   - Implementation completeness
   - Automation level
   - Measurement and metrics
   - Continuous improvement evidence
3. Score using tier criteria (1-4 scale)
4. Document evidence supporting each tier rating
5. Identify strengths, gaps, and improvement areas

### Phase 3: Target State Definition (Weeks 7-8)
1. Define target tier for each Function based on:
   - Risk appetite and tolerance
   - Industry requirements and benchmarks
   - Regulatory obligations
   - Available resources and budget
2. Create Target Profile documenting desired maturity state
3. Validate target state with executive leadership

### Phase 4: Gap Analysis and Roadmap (Weeks 9-12)
1. Compare Current Profile to Target Profile
2. Prioritize gaps based on risk reduction potential
3. Develop improvement roadmap with:
   - Short-term quick wins (0-3 months)
   - Medium-term improvements (3-12 months)
   - Long-term strategic initiatives (12-24 months)
4. Estimate resource requirements for each initiative
5. Assign ownership and timelines

### Phase 5: Implementation and Reassessment (Ongoing)
1. Execute improvement roadmap initiatives
2. Track progress against milestones
3. Conduct periodic reassessments (annually recommended)
4. Report maturity progress to leadership
5. Adjust roadmap based on evolving threats and business changes

## Key Artifacts
- CSF Current Profile (by Function/Category/Subcategory)
- CSF Target Profile
- Gap Analysis Report
- Maturity Assessment Scorecard
- Improvement Roadmap with Priorities
- Executive Summary and Dashboard

## Common Pitfalls
- Assessing technology only without evaluating governance and people
- Setting unrealistic target tiers without resource commitment
- Treating assessment as one-time rather than continuous process
- Ignoring the new Govern function in CSF 2.0
- Not aligning CSF assessment with existing compliance requirements (ISO 27001, SOC 2)

## References
- NIST CSF 2.0: https://csf.tools/reference/nist-cybersecurity-framework/v2-0/
- NIST SP 800-53 Rev 5 (control catalog that maps to CSF)
- NIST CSF 2.0 Quick Start Guides
- CSF 2.0 Reference Tool: https://csrc.nist.gov/projects/cybersecurity-framework

Related Skills

performing-yara-rule-development-for-detection

16
from plurigrid/asi

Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.

performing-wireless-security-assessment-with-kismet

16
from plurigrid/asi

Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.

performing-wireless-network-penetration-test

16
from plurigrid/asi

Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.

performing-windows-artifact-analysis-with-eric-zimmerman-tools

16
from plurigrid/asi

Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.

performing-wifi-password-cracking-with-aircrack

16
from plurigrid/asi

Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary attacks during authorized wireless security assessments to evaluate passphrase strength and wireless network security posture.

performing-web-cache-poisoning-attack

16
from plurigrid/asi

Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.

performing-web-cache-deception-attack

16
from plurigrid/asi

Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.

performing-web-application-vulnerability-triage

16
from plurigrid/asi

Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.

performing-web-application-scanning-with-nikto

16
from plurigrid/asi

Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve

performing-web-application-penetration-test

16
from plurigrid/asi

Performs systematic security testing of web applications following the OWASP Web Security Testing Guide (WSTG) methodology to identify vulnerabilities in authentication, authorization, input validation, session management, and business logic. The tester uses Burp Suite as the primary interception proxy alongside manual testing techniques to find flaws that automated scanners miss. Activates for requests involving web app pentest, OWASP testing, application security assessment, or web vulnerability testing.

performing-web-application-firewall-bypass

16
from plurigrid/asi

Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution, and payload obfuscation to deliver SQL injection, XSS, and other attack payloads past WAF detection rules.

performing-vulnerability-scanning-with-nessus

16
from plurigrid/asi

Performs authenticated and unauthenticated vulnerability scanning using Tenable Nessus to identify known vulnerabilities, misconfigurations, default credentials, and missing patches across network infrastructure, servers, and applications. The scanner correlates findings with CVE databases and CVSS scores to produce prioritized remediation guidance. Activates for requests involving vulnerability scanning, Nessus assessment, patch compliance checking, or automated vulnerability detection.