From faos-ciso
<!-- AUTO-GENERATED by export-plugins.py — DO NOT EDIT -->
npx claudepluginhub frank-luongt/faos-skills-marketplace --plugin faos-cisoThis skill uses the workspace's default tool permissions.
Implements structured self-debugging workflow for AI agent failures: capture errors, diagnose patterns like loops or context overflow, apply contained recoveries, and generate introspection reports.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
The NIST Cybersecurity Framework 2.0 provides a taxonomy of high-level cybersecurity outcomes that any organization can use to understand, assess, prioritize, and communicate its cybersecurity efforts. Released in February 2024, CSF 2.0 introduces the GOVERN function and expands applicability beyond critical infrastructure to all organization types.
The framework consists of three main components:
Document your organization's current cybersecurity posture by evaluating each function, category, and subcategory. Rate each outcome on a maturity scale (Tier 1-4):
Establish the desired cybersecurity state based on business objectives, regulatory requirements, and risk appetite. Prioritize outcomes that matter most to the organization.
Compare the current profile against the target profile to identify gaps. Document each gap with its associated risk and effort to remediate.
Rank gaps by risk impact and implementation feasibility. Create a phased roadmap that addresses critical gaps first while building toward the target profile.
Execute the roadmap by deploying technical controls, updating policies, training staff, and establishing monitoring. Track progress against the target profile.
Establishes and monitors the organization's cybersecurity risk management strategy, expectations, and policy.
| Category | Description |
|---|---|
| GV.OC | Organizational Context -- mission, stakeholder expectations, legal requirements |
| GV.RM | Risk Management Strategy -- priorities, constraints, risk tolerance |
| GV.RR | Roles, Responsibilities, and Authorities |
| GV.PO | Policy -- established, communicated, enforced |
| GV.SC | Supply Chain Risk Management |
| GV.OV | Oversight -- results used to adjust strategy |
Understand the organization's assets, risks, and attack surface.
| Category | Description |
|---|---|
| ID.AM | Asset Management -- hardware, software, data, systems inventoried |
| ID.RA | Risk Assessment -- vulnerabilities, threats, likelihood, impact |
| ID.IM | Improvement -- lessons learned drive improvements |
Safeguards to manage cybersecurity risks.
| Category | Description |
|---|---|
| PR.AA | Identity Management, Authentication, and Access Control |
| PR.AT | Awareness and Training |
| PR.DS | Data Security -- data at rest, in transit, in use |
| PR.PS | Platform Security -- hardware, software, services managed |
| PR.IR | Technology Infrastructure Resilience |
Find and analyze possible cybersecurity attacks and compromises.
| Category | Description |
|---|---|
| DE.CM | Continuous Monitoring -- networks, systems, assets monitored |
| DE.AE | Adverse Event Analysis -- anomalies analyzed, events correlated |
Take action regarding a detected cybersecurity incident.
| Category | Description |
|---|---|
| RS.MA | Incident Management -- response executed, triaged |
| RS.AN | Incident Analysis -- investigation, forensics |
| RS.CO | Incident Response Reporting and Communication |
| RS.MI | Incident Mitigation -- containment and eradication |
Restore assets and operations affected by a cybersecurity incident.
| Category | Description |
|---|---|
| RC.RP | Incident Recovery Plan Execution |
| RC.CO | Incident Recovery Communication |
A Series B SaaS startup with 50 engineers needs to formalize its security program for enterprise customers.
Phase 1 -- Foundations (Months 1-3):
Phase 2 -- Detection (Months 4-6):
Phase 3 -- Maturity (Months 7-12):
nist_csf_assessment:
organization: "Acme Corp"
assessment_date: "2026-02-24"
assessor: "Security Team"
framework_version: "2.0"
functions:
- function: GOVERN
current_tier: 2
target_tier: 3
categories:
- id: GV.OC
current_maturity: "partial"
target_maturity: "repeatable"
gap: "No formal documentation of legal and regulatory obligations"
remediation: "Create compliance register, map to controls"
priority: high
effort: medium
- id: GV.RM
current_maturity: "risk_informed"
target_maturity: "repeatable"
gap: "Risk appetite not formally defined by leadership"
remediation: "Conduct risk appetite workshop with executive team"
priority: high
effort: low
- function: IDENTIFY
current_tier: 2
target_tier: 3
categories:
- id: ID.AM
current_maturity: "risk_informed"
target_maturity: "repeatable"
gap: "Shadow IT not tracked, no CMDB"
remediation: "Deploy asset discovery tool, establish CMDB"
priority: critical
effort: high
- function: PROTECT
current_tier: 3
target_tier: 3
categories:
- id: PR.AA
current_maturity: "repeatable"
target_maturity: "repeatable"
gap: "None -- MFA and RBAC in place"
remediation: "Maintain current controls"
priority: low
effort: none
summary:
total_gaps: 12
critical_gaps: 3
high_gaps: 5
medium_gaps: 4
estimated_remediation_months: 9
GOVERN:
IDENTIFY:
PROTECT:
DETECT:
RESPOND:
RECOVER: