nist-csf-specialist by borghei/claude-skills
npx skills add https://github.com/borghei/claude-skills --skill nist-csf-specialist实施、评估和管理符合 NIST 网络安全框架 2.0 的网络安全计划——这是组织网络安全风险管理的权威标准。
当您听到以下内容时使用此技能:
python scripts/csf_maturity_assessor.py --input assessment.json --target-tier 3 --output maturity_report.json
python scripts/csf_control_mapper.py --source-framework nist-csf --target-framework iso27001 --output mapping.json
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
python scripts/csf_maturity_assessor.py --input assessment.json --target-tier 4 --format markdown --output gap_analysis.md
python scripts/csf_control_mapper.py --source-framework nist-csf --target-framework all --output unified_matrix.json
NIST CSF 2.0 的综合性成熟度评估引擎。
能力:
用法:
# 包含差距分析的完整成熟度评估
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--target-tier 3 \
--output report.json
# 用于高管演示的 Markdown 报告
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--target-tier 4 \
--format markdown \
--output executive_report.md
# 仅评估特定功能
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--functions GOVERN,IDENTIFY,PROTECT \
--target-tier 3 \
--output partial_report.json
输入格式 (current_state.json):
{
"organization": "Acme Corp",
"assessment_date": "2026-03-09",
"assessor": "Security Team",
"functions": {
"GOVERN": {
"GV.OC": {
"score": 2,
"evidence": "Mission documented, partial stakeholder mapping",
"notes": "Legal requirements catalog incomplete"
},
"GV.RM": {
"score": 1,
"evidence": "No formal risk management strategy",
"notes": "Risk appetite not defined"
}
},
"IDENTIFY": {
"ID.AM": {
"score": 3,
"evidence": "CMDB maintained, automated discovery",
"notes": "Shadow IT gap exists"
}
}
}
}
跨框架控制措施映射引擎。
能力:
用法:
# 将 CSF 映射到 ISO 27001
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework iso27001 \
--output iso_mapping.json
# 将 CSF 映射到所有支持的框架
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework all \
--output unified_matrix.json
# 仅映射特定功能
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework soc2 \
--functions GOVERN,PROTECT \
--output soc2_mapping.json
# 用于文档的 Markdown 输出
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework iso27001 \
--format markdown \
--output mapping_report.md
NIST CSF 2.0 于 2024 年 2 月发布,代表了自 2014 年原始框架和 2018 年 v1.1 更新以来的重大演进:
范围扩大: CSF 2.0 适用于所有组织——不仅仅是关键基础设施。小型企业、政府机构、高等教育机构和非营利组织现在都明确在范围内。
新增 GOVERN 功能: 这是最重要的变化。GOVERN 将网络安全治理提升到顶层功能,认识到高管领导力、政策和监督是有效网络安全的先决条件。
增强的供应链关注: 网络安全供应链风险管理 (C-SCRM) 现在是 GOVERN 下的一个类别,反映了供应链攻击是主要威胁载体的现实。
改进的指南: CSF 2.0 包含了早期版本中没有的实施示例和快速入门指南。该框架更具可操作性和规范性,同时保持了其灵活的、基于风险的方法。
配置文件更新: 配置文件现在更明确地定义为组织配置文件(描述当前/目标状态)和社区配置文件(特定行业的模板)。
┌─────────────────────────────────────────────────────┐
│ CSF CORE │
│ │
│ ┌─────────┐ │
│ │ GOVERN │ ← NEW: Overarching governance │
│ └────┬────┘ │
│ │ │
│ ┌────▼────┐ ┌─────────┐ ┌────────┐ ┌─────────┐│
│ │IDENTIFY │→ │ PROTECT │→ │ DETECT │→ │ RESPOND ││
│ └─────────┘ └─────────┘ └────────┘ └────┬────┘│
│ │ │
│ ┌────▼────┐ │
│ │ RECOVER │ │
│ └─────────┘ │
├─────────────────────────────────────────────────────┤
│ PROFILES │
│ Current State ↔ Target State │
├─────────────────────────────────────────────────────┤
│ TIERS │
│ Partial → Risk Informed → Repeatable → Adaptive │
└─────────────────────────────────────────────────────┘
GOVERN 功能建立并监控组织的网络安全风险管理策略、期望和政策。它是连接所有其他功能的纽带。
了解组织的使命、利益相关者期望和依赖关系是所有网络安全决策的基础。
关键活动:
实施指南:
成熟度指标:
| 层级 | 指标 |
|---|---|
| 第 1 级 | 对使命和义务的临时性理解 |
| 第 2 级 | 记录在案的使命一致性,部分法规目录 |
| 第 3 级 | 正式的利益相关者映射,完整的法规登记册,定义的风险偏好 |
| 第 4 级 | 动态的风险偏好调整,持续的利益相关者参与,实时的法规跟踪 |
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
关键指标:
关键活动:
实施指南:
IDENTIFY 功能建立组织理解,以管理系统、资产、数据和能力的网络安全风险。
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
PROTECT 功能实施适当的防护措施,以确保关键服务的交付。
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
DETECT 功能定义用于识别网络安全事件发生的活动。
关键活动:
实施指南:
关键活动:
实施指南:
RESPOND 功能包括针对已检测到的网络安全事件采取行动的活动。
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
关键活动:
实施指南:
RECOVER 功能确定在事件后保持韧性并恢复能力的活动。
关键活动:
实施指南:
关键活动:
实施指南:
配置文件使组织能够描述其当前的网络安全状况及其目标状态。
组织当前如何管理网络安全风险的快照,根据 CSF 类别和子类别进行评估。
创建当前配置文件:
期望的网络安全状态,基于业务目标、法规要求和风险偏好确定。
创建目标配置文件:
当前配置文件与目标配置文件之间的差异驱动着实施路线图。
差距分析流程:
层级描述了组织的网络安全风险管理实践在多大程度上展现出框架中定义的特征。
NIST CSF 2.0 可映射到多个合规框架,使组织能够同时满足多项要求。
| CSF 功能 | CSF 类别 | ISO 27001 附录 A 控制措施 |
|---|---|---|
| GOVERN | GV.OC | A.5.1, A.5.2 (政策, 角色) |
| GOVERN | GV.RM | A.5.3 (职责分离) |
| GOVERN | GV.PO | A.5.1 (信息安全政策) |
| GOVERN | GV.SC | A.5.19-5.23 (供应商关系) |
| IDENTIFY | ID.AM | A.5.9, A.5.10, A.8.1 (资产管理) |
| IDENTIFY | ID.RA | A.5.7 (威胁情报), A.8.8 (漏洞管理) |
| PROTECT | PR.AA | A.5.15-5.18, A.8.2-8.5 (访问控制) |
| PROTECT | PR.DS | A.8.10-8.12, A.8.24 (密码学, 数据) |
| PROTECT | PR.PS | A.8.9 (配置), A.8.19 (软件安装) |
| DETECT | DE.CM | A.8.15, A.8.16 (日志记录, 监控) |
| RESPOND | RS.MA | A.5.24-5.28 (事件管理) |
| RECOVER | RC.RP | A.5.29, A.5.30 (ICT 连续性) |
| CSF 功能 | SOC 2 TSC |
|---|---|
| GOVERN | CC1 (控制环境), CC2 (沟通) |
| IDENTIFY | CC3 (风险评估) |
| PROTECT | CC5 (控制活动), CC6 (逻辑和物理访问) |
| DETECT | CC7 (系统运营) |
| RESPOND | CC7 (系统运营), CC8 (变更管理) |
| RECOVER | CC9 (风险缓解), A1 (可用性) |
| CSF 功能 | HIPAA 保障措施 |
|---|---|
| GOVERN | 管理保障措施 (§164.308) |
| IDENTIFY | 风险分析 (§164.308(a)(1)) |
| PROTECT | 访问控制 (§164.312(a)), 传输安全 (§164.312(e)) |
| DETECT | 审计控制 (§164.312(b)), 完整性控制 (§164.312(c)) |
| RESPOND | 安全事件程序 (§164.308(a)(6)) |
| RECOVER | 应急计划 (§164.308(a)(7)) |
| CSF 功能 | PCI-DSS 要求 |
|---|---|
| GOVERN | 要求 12 (组织政策) |
| IDENTIFY | 要求 2 (安全配置), 要求 12.4 (风险评估) |
| PROTECT | 要求 3-4 (数据保护), 要求 7-8 (访问控制), 要求 9 (物理安全) |
| DETECT | 要求 10-11 (日志记录, 测试) |
| RESPOND | 要求 12.10 (事件响应) |
| RECOVER | 要求 12.10.2 (恢复程序) |
GOVERN 评估:
IDENTIFY 评估:
PROTECT 评估:
DETECT 评估:
RESPOND 评估:
RECOVER 评估:
重点:GOVERN + IDENTIFY
交付成果:
重点:PROTECT
交付成果:
重点:DETECT + RESPOND
交付成果:
重点:RECOVER + 持续改进
**交付成果:
Implement, assess, and manage cybersecurity programs aligned with the NIST Cybersecurity Framework 2.0 — the definitive standard for organizational cybersecurity risk management.
Use this skill when you hear:
python scripts/csf_maturity_assessor.py --input assessment.json --target-tier 3 --output maturity_report.json
python scripts/csf_control_mapper.py --source-framework nist-csf --target-framework iso27001 --output mapping.json
python scripts/csf_maturity_assessor.py --input assessment.json --target-tier 4 --format markdown --output gap_analysis.md
python scripts/csf_control_mapper.py --source-framework nist-csf --target-framework all --output unified_matrix.json
Comprehensive maturity assessment engine for NIST CSF 2.0.
Capabilities:
Usage:
# Full maturity assessment with gap analysis
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--target-tier 3 \
--output report.json
# Markdown report for executive presentation
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--target-tier 4 \
--format markdown \
--output executive_report.md
# Assess specific functions only
python scripts/csf_maturity_assessor.py \
--input current_state.json \
--functions GOVERN,IDENTIFY,PROTECT \
--target-tier 3 \
--output partial_report.json
Input Format (current_state.json):
{
"organization": "Acme Corp",
"assessment_date": "2026-03-09",
"assessor": "Security Team",
"functions": {
"GOVERN": {
"GV.OC": {
"score": 2,
"evidence": "Mission documented, partial stakeholder mapping",
"notes": "Legal requirements catalog incomplete"
},
"GV.RM": {
"score": 1,
"evidence": "No formal risk management strategy",
"notes": "Risk appetite not defined"
}
},
"IDENTIFY": {
"ID.AM": {
"score": 3,
"evidence": "CMDB maintained, automated discovery",
"notes": "Shadow IT gap exists"
}
}
}
}
Cross-framework control mapping engine.
Capabilities:
Usage:
# Map CSF to ISO 27001
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework iso27001 \
--output iso_mapping.json
# Map CSF to all supported frameworks
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework all \
--output unified_matrix.json
# Map specific functions only
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework soc2 \
--functions GOVERN,PROTECT \
--output soc2_mapping.json
# Markdown output for documentation
python scripts/csf_control_mapper.py \
--source-framework nist-csf \
--target-framework iso27001 \
--format markdown \
--output mapping_report.md
Released in February 2024, NIST CSF 2.0 represents a major evolution from the original 2014 framework and 2018 v1.1 update:
Expanded Scope: CSF 2.0 applies to ALL organizations — not just critical infrastructure. Small businesses, government agencies, higher education, and nonprofits are now explicitly in scope.
New GOVERN Function: The most significant change. GOVERN elevates cybersecurity governance to a top-level function, recognizing that executive leadership, policy, and oversight are prerequisites for effective cybersecurity.
Enhanced Supply Chain Focus: Cybersecurity Supply Chain Risk Management (C-SCRM) is now a category under GOVERN, reflecting the reality that supply chain attacks are a primary threat vector.
Improved Guidance: CSF 2.0 includes implementation examples and quick-start guides that were absent in earlier versions. The framework is more actionable and prescriptive while maintaining its flexible, risk-based approach.
Profile Updates: Profiles are now more clearly defined as organizational profiles (describing current/target states) and community profiles (sector-specific templates).
┌─────────────────────────────────────────────────────┐
│ CSF CORE │
│ │
│ ┌─────────┐ │
│ │ GOVERN │ ← NEW: Overarching governance │
│ └────┬────┘ │
│ │ │
│ ┌────▼────┐ ┌─────────┐ ┌────────┐ ┌─────────┐│
│ │IDENTIFY │→ │ PROTECT │→ │ DETECT │→ │ RESPOND ││
│ └─────────┘ └─────────┘ └────────┘ └────┬────┘│
│ │ │
│ ┌────▼────┐ │
│ │ RECOVER │ │
│ └─────────┘ │
├─────────────────────────────────────────────────────┤
│ PROFILES │
│ Current State ↔ Target State │
├─────────────────────────────────────────────────────┤
│ TIERS │
│ Partial → Risk Informed → Repeatable → Adaptive │
└─────────────────────────────────────────────────────┘
The GOVERN function establishes and monitors the organization's cybersecurity risk management strategy, expectations, and policy. It is the connective tissue across all other functions.
Understanding the organization's mission, stakeholder expectations, and dependencies is the foundation for all cybersecurity decisions.
Key Activities:
Implementation Guidance:
Maturity Indicators:
| Tier | Indicator |
|---|---|
| Tier 1 | Ad hoc understanding of mission and obligations |
| Tier 2 | Documented mission alignment, partial regulatory catalog |
| Tier 3 | Formal stakeholder mapping, complete regulatory register, defined risk appetite |
| Tier 4 | Dynamic risk appetite adjustment, continuous stakeholder engagement, real-time regulatory tracking |
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Key Metrics:
Key Activities:
Implementation Guidance:
The IDENTIFY function develops organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
The PROTECT function implements appropriate safeguards to ensure delivery of critical services.
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
The DETECT function defines activities to identify the occurrence of a cybersecurity event.
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
The RESPOND function includes activities to take action regarding a detected cybersecurity incident.
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
The RECOVER function identifies activities to maintain resilience and restore capabilities after an incident.
Key Activities:
Implementation Guidance:
Key Activities:
Implementation Guidance:
Profiles enable organizations to describe their current cybersecurity posture and their target state.
A snapshot of how the organization currently manages cybersecurity risk, assessed against CSF categories and subcategories.
Creating a Current Profile:
The desired cybersecurity state, informed by business objectives, regulatory requirements, and risk appetite.
Creating a Target Profile:
The difference between current and target profiles drives the implementation roadmap.
Gap Analysis Process:
Tiers describe the degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the framework.
NIST CSF 2.0 maps to multiple compliance frameworks, enabling organizations to satisfy multiple requirements simultaneously.
| CSF Function | CSF Category | ISO 27001 Annex A Controls |
|---|---|---|
| GOVERN | GV.OC | A.5.1, A.5.2 (Policies, Roles) |
| GOVERN | GV.RM | A.5.3 (Segregation of Duties) |
| GOVERN | GV.PO | A.5.1 (Information Security Policy) |
| GOVERN | GV.SC | A.5.19-5.23 (Supplier Relations) |
| IDENTIFY | ID.AM | A.5.9, A.5.10, A.8.1 (Asset Management) |
| IDENTIFY | ID.RA | A.5.7 (Threat Intelligence), A.8.8 (Vulnerability Management) |
| PROTECT | PR.AA | A.5.15-5.18, A.8.2-8.5 (Access Control) |
| PROTECT | PR.DS | A.8.10-8.12, A.8.24 (Cryptography, Data) |
| PROTECT | PR.PS | A.8.9 (Configuration), A.8.19 (Software Installation) |
| CSF Function | SOC 2 TSC |
|---|---|
| GOVERN | CC1 (Control Environment), CC2 (Communication) |
| IDENTIFY | CC3 (Risk Assessment) |
| PROTECT | CC5 (Control Activities), CC6 (Logical & Physical Access) |
| DETECT | CC7 (System Operations) |
| RESPOND | CC7 (System Operations), CC8 (Change Management) |
| RECOVER | CC9 (Risk Mitigation), A1 (Availability) |
| CSF Function | HIPAA Safeguard |
|---|---|
| GOVERN | Administrative Safeguards (§164.308) |
| IDENTIFY | Risk Analysis (§164.308(a)(1)) |
| PROTECT | Access Control (§164.312(a)), Transmission Security (§164.312(e)) |
| DETECT | Audit Controls (§164.312(b)), Integrity Controls (§164.312(c)) |
| RESPOND | Security Incident Procedures (§164.308(a)(6)) |
| RECOVER | Contingency Plan (§164.308(a)(7)) |
| CSF Function | PCI-DSS Requirements |
|---|---|
| GOVERN | Req 12 (Organizational Policies) |
| IDENTIFY | Req 2 (Secure Configurations), Req 12.4 (Risk Assessment) |
| PROTECT | Req 3-4 (Data Protection), Req 7-8 (Access Control), Req 9 (Physical) |
| DETECT | Req 10-11 (Logging, Testing) |
| RESPOND | Req 12.10 (Incident Response) |
| RECOVER | Req 12.10.2 (Recovery Procedures) |
GOVERN Assessment:
IDENTIFY Assessment:
PROTECT Assessment:
DETECT Assessment:
RESPOND Assessment:
RECOVER Assessment:
Focus: GOVERN + IDENTIFY
Deliverables:
Focus: PROTECT
Deliverables:
Focus: DETECT + RESPOND
Deliverables:
Focus: RECOVER + Continuous Improvement
Deliverables:
| Guide | Description |
|---|---|
| CSF Functions Guide | Complete reference for all 6 functions, categories, subcategories, evidence requirements |
| CSF Implementation Playbook | Step-by-step implementation guide with templates, prioritization, and budgeting |
Weekly Installs
1
Repository
GitHub Stars
29
First Seen
Today
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
zencoder1
amp1
cline1
openclaw1
opencode1
cursor1
通过 LiteLLM 代理让 Claude Code 对接 GitHub Copilot 运行 | 高级变通方案指南
31,600 周安装
| DETECT | DE.CM | A.8.15, A.8.16 (Logging, Monitoring) |
| RESPOND | RS.MA | A.5.24-5.28 (Incident Management) |
| RECOVER | RC.RP | A.5.29, A.5.30 (ICT Continuity) |