Back to resources

NIST CSF 2.0 and Least Privilege: Bridging Gaps in Identity Security

January 2025  /  11 min. read   /  
Matt Wilson

NIST CSF 2.0 least privilege: bridging gaps in identity security

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has long been a cornerstone for organizations aiming to bolster their cybersecurity posture. With the release of NIST CSF 2.0 in early 2024, the framework expands its focus, offering updated guidelines to address today’s evolving threat landscape. It is the result of a multi-year collaboration between the private sector, the US public sector and governments around the world, and academic researchers. 

There is an important consideration to understand when evaluating the CSF as part of your security and identity practices. The CSF does not offer prescriptive guidance for how outcomes should be achieved. The framework does provide links to resources that provide additional guidance on practices and controls that can be used to achieve its outcomes, although there are many options for each objective. However, in areas where the CSF has coverage gaps or could go even further, you must look elsewhere for both guidance and solutions. 

While the new version brings significant benefits, it’s essential to evaluate both its advantages and potential drawbacks to understand its impact on your organization’s security strategy. As you will see, there are multiple steps in the direction of improved identity security posture, yet gaps still remain—especially when it comes to cloud systems. We will be looking at the Cloud Security Alliance’s (CSA) Cloud Controls Matrix (CCM) v4 to highlight some of these gaps and recommendations for going beyond NIST CSF 2.0. 

Cryptography, Encryption & Key Management

Identity management, authentication, and access control requirements highlighting least privilege and separation of duties for entitlements and authorizations

Identity & Access Management

Identity and access management IAM requirements for NIST CSF ask that entitlements and authorizations are defined in a policy and managed, enforced, reviewed, and incorporate the principles of least privilege and separation of duties.

Logging & Monitoring

Requirements defined around identity, authentication, and access control permissions, specifically for continuous monitoring and lifecycle management to incorporate requirements around separation of duties and principles of least privilege.

Both CSF and CCM frameworks have far more controls than listed above. These are only the identity- and authorization-focused areas concerned with implementing systems or processes where NIST CSF 2.0 could go even further in its security recommendations such as by adopting the extra controls in CCM v4.

The good news for identity-focused security practitioners is the are many areas where coverage is aligned between the two frameworks. This should make evaluating the right security tools and practices that have the broadest coverage an easier task. And as with any such frameworks that lack prescriptive guidance, use your best judgement and don’t be afraid to augment a singular framework with additional controls. 

Want to learn more about how Britive can help you meet requirements for NIST CSF 2.0, CSA CCM v4 or other cybersecurity frameworks? Schedule time to chat with a member of the team or get a personalized demo.