NIST Cybersecurity Framework 2.0 — SOC Mapping
Maps SOC operational processes to NIST CSF 2.0 Functions and Categories
Use this document to demonstrate alignment during audits and identify coverage gaps
1. Overview
The NIST Cybersecurity Framework (CSF) 2.0, released February 2024, organizes cybersecurity activities into 6 Functions and 22 Categories. This mapping shows how SOC SOPs address each function.
graph LR
GV[🏛️ GOVERN] --> ID[🔍 IDENTIFY]
ID --> PR[🛡️ PROTECT]
PR --> DE[📡 DETECT]
DE --> RS[🚨 RESPOND]
RS --> RC[🔄 RECOVER]
style GV fill:#6366f1,color:#fff
style ID fill:#0ea5e9,color:#fff
style PR fill:#22c55e,color:#fff
style DE fill:#f59e0b,color:#fff
style RS fill:#ef4444,color:#fff
style RC fill:#8b5cf6,color:#fff
pie title SOC Coverage by CSF Function
"Govern — Partial" : 3
"Identify — Partial" : 3
"Protect — Partial" : 4
"Detect — Full" : 4
"Respond — Full" : 5
"Recover — Full" : 3
SOC directly covers 12/22 Categories with full or substantial alignment. 10 remaining categories are outside core SOC scope (HR, procurement, physical security, etc.)
2. GOVERN (GV) — Organizational Context
3. IDENTIFY (ID) — Asset & Risk Understanding
4. PROTECT (PR) — Safeguards
5. DETECT (DE) — Detection & Analysis ⭐
This is the SOC's primary function — coverage is comprehensive
6. RESPOND (RS) — Incident Response ⭐
Core SOC mission — the most thoroughly covered function
7. RECOVER (RC) — Recovery
8. Coverage Summary
| Function |
Categories |
SOC Covered |
Key Strength |
| Govern |
6 |
3 full + 3 partial |
Team structure, policies, oversight |
| Identify |
3 |
2 full + 1 partial |
Risk assessment, improvement cycle |
| Protect |
5 |
3 full + 2 partial |
IAM, training, DR/BCP |
| Detect |
3 |
3 full |
Monitoring, Sigma rules, runbooks |
| Respond |
5 |
5 full |
IR framework, 50 playbooks, forensics |
| Recover |
3 |
3 full |
DR/BCP, lessons learned, comms |
| Total |
22 |
16 full + 6 partial |
|
Gaps Requiring Attention 🟡
| Gap |
Recommendation |
Priority |
| ID.AM Asset Management |
Integrate CMDB/asset inventory into Log Source Matrix |
Medium |
| PR.DS Data Security |
Expand DLP monitoring documentation |
Medium |
| PR.PS Platform Security |
Add SIEM/EDR hardening guide |
Low |
| GV.OC Organizational Context |
Reference enterprise risk appetite in SOC charter |
Low |
References