npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF, using the four Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive) to measure organizationa...
Conducts NIST CSF 2.0 maturity assessments using Implementation Tiers to measure organizational cybersecurity posture across Govern, Identify, Protect, Detect, Respond, Recover functions and create roadmaps.
Advises on NIST CSF 2.0/1.1 for cybersecurity risk management, gap assessments, profiles, tiers, roadmaps, mappings to NIST 800-53/ISO 27001/CIS/COBIT.
Guides NIST CSF 2.0 maturity assessment across Govern, Identify, Protect, Detect, Respond, Recover using 4 tiers to score current state, identify gaps, set targets, and build improvement roadmaps.
Share bugs, ideas, or general feedback.
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF, using the four Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive) to measure organizational cybersecurity posture and create improvement roadmaps.
| Function | Code | Categories | Purpose |
|---|---|---|---|
| Govern | GV | 6 | Establish and monitor cybersecurity risk management strategy |
| Identify | ID | 3 | Determine current cybersecurity risk to the organization |
| Protect | PR | 5 | Implement safeguards to prevent or reduce risk |
| Detect | DE | 2 | Find and analyze possible cybersecurity attacks |
| Respond | RS | 4 | Take action regarding detected cybersecurity incidents |
| Recover | RC | 2 | Restore capabilities impaired by cybersecurity incidents |
| Tier | Name | Description |
|---|---|---|
| Tier 1 | Partial | Ad hoc, reactive; limited awareness of cybersecurity risk |
| Tier 2 | Risk-Informed | Risk-aware but not organization-wide; approved but may not be policy |
| Tier 3 | Repeatable | Formal policies; consistently implemented; regularly updated |
| Tier 4 | Adaptive | Continuous improvement; real-time risk response; lessons learned integrated |