Risk & Compliance Engine
NIST CSF Alignment
How TrustCyber maps your security posture to the NIST Cybersecurity Framework 2.0.
The NIST Cybersecurity Framework (CSF) 2.0 is the most widely adopted cybersecurity framework in the United States and is increasingly used globally. TrustCyber maps your Microsoft 365 security posture to all six NIST CSF functions: Govern, Identify, Protect, Detect, Respond, and Recover.
NIST CSF Functions Coverage
| Function | TrustCyber Coverage | Key Controls Assessed |
|---|---|---|
| Govern (GV) | Full | Risk governance, policies, roles, supply chain risk |
| Identify (ID) | Full | Asset inventory, risk assessment, vulnerability management |
| Protect (PR) | Full | Identity management, MFA, data protection, secure configuration |
| Detect (DE) | Partial | Security monitoring, anomaly detection (requires Defender data) |
| Respond (RS) | Partial | Incident response plan assessment, communication procedures |
| Recover (RC) | Full | Backup coverage, business continuity, recovery planning |
NoteDetect and Respond functions are partially covered. Full coverage requires Microsoft Defender for Endpoint and Microsoft Sentinel data, which TrustCyber can ingest if those products are deployed in your environment.