{"id":9697,"date":"2024-03-01T14:41:13","date_gmt":"2024-03-01T22:41:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9697"},"modified":"2024-03-19T22:07:39","modified_gmt":"2024-03-20T06:07:39","slug":"nist-cybersecurity-framework-2-0-published","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/","title":{"rendered":"NIST Cybersecurity Framework 2.0 Published"},"content":{"rendered":"<p>On February 26, 2024, National Institute of Standards and Technology (NIST) unveiled the eagerly awaited <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.pdf\">NIST CSF 2.0<\/a>, the first major update since 1.1 was released in 2018.<\/p>\n<p>The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.\u00a0<\/p>\n<p>Why the update? The answer lies in the ever-evolving threat landscape. Cyberattacks have become more sophisticated, persistent, and diverse. Threat actors exploit vulnerabilities across interconnected systems, and organizations grapple with an expanding attack surface. The NIST CSF 2.0 responds to these challenges by incorporating lessons learned, emerging best practices, and real-world experiences. It\u2019s a dynamic response to a dynamic threat environment.<\/p>\n<p>Version 2.0 brings notable enhancements, such as:<\/p>\n<ol>\n<li><b>Expanded Scope<\/b>:\u00a0 While the original CSF was targeted to protect critical infrastructure, the update is intended to provide guidance for all organizations and industries.<\/li>\n<li><b>Governance Function<\/b>: NIST CSF 2.0 adds a new Govern function to better emphasize the importance of elevating cybersecurity to the board and C-suite.<\/li>\n<li><b>Supply Chain Security<\/b>: The updated framework adds additional focus on the critical role of supply chains and the need for organizations to consider the security of their suppliers, partners, and third-party vendors.<\/li>\n<li><b>Expanded Resources<\/b>: NIST has updated or expanded the supplementary resources available to companies, including<a href=\"https:\/\/www.nist.gov\/profiles-0\"> CSF Organizational Profiles<\/a>,<a href=\"https:\/\/www.nist.gov\/quick-start-guides\"> Quick Start Guides<\/a>,<a href=\"https:\/\/www.nist.gov\/informative-references\"> Informative References<\/a>, and<a href=\"https:\/\/www.nist.gov\/system\/files\/documents\/2024\/02\/21\/CSF%202.0%20Implementation%20Examples.pdf\"> Implementation Examples<\/a>.\u00a0\u00a0\u00a0\u00a0<\/li>\n<\/ol>\n<p>One important theme in the NIST CSF is the criticality of threat intelligence and threat hunting capabilities in an organization\u2019s cybersecurity defenses. Organizations should understand their inventory of assets, actively seek out indicators of compromise, analyze threat patterns, and stay ahead of potential attacks. A few highlights:<\/p>\n<p><b>IDENTIFY (ID):<\/b> The organization\u2019s current cybersecurity risks are understood<\/p>\n<ul class=\"highlights-list\">\n<li><b>Asset Management (ID.AM):<\/b> Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization\u2019s risk strategy<\/li>\n<\/ul>\n<p><b>PROTECT (PR):<\/b> Safeguards to manage the organization\u2019s cybersecurity risks are used<\/p>\n<ul class=\"highlights-list\">\n<li><b>Platform Security (PR.PS):<\/b> The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization\u2019s risk strategy to protect their confidentiality, integrity, and availability<\/li>\n<li><b>Technology Infrastructure Resilience (PR.IR)<\/b>: Security architectures are managed with the organization\u2019s risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience<\/li>\n<\/ul>\n<p><b>DETECT (DE):<\/b> Possible cybersecurity attacks and compromises are found and analyzed<\/p>\n<ul class=\"highlights-list\">\n<li><b>Continuous Monitoring (DE.CM):<\/b> Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events<\/li>\n<li><b>Adverse Event Analysis (DE.AE):<\/b> Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents.<\/li>\n<\/ul>\n<p>With 92% of malware relying primarily on DNS, Infoblox\u2019s BloxOne Threat Defense solution provides organizations with the ubiquitous visibility and control required to provide holistic detection and response. The unique research that underpins Infoblox\u2019s threat intelligence, that targets the threat actors infrastructure rather than individual malware campaigns, provides the most scalable way to mitigate the ever increasing breadth and scale of attacks. The suspicious domains detected by tracking threat actors allows organizations to proactively block threat actor\u2019s malicious infrastructure even before it becomes activated. This can dramatically reduce cyber security risks, avoiding the race conditions associated with fast moving malware and scams.\u00a0<\/p>\n<p>With the recent release of Infoblox\u2019s new BloxOne\u00ae Threat Defense SOC Insights this allows SOC teams to operationalize the\u00a0 value of DNS based threat detection, enabling continuous monitoring and efficient incident response. It correlates critical data from multiple sources, such as newly observed domains, WHOIS domain registration data, threat actor context and asset data.\u00a0 SOC Insights empowers security analysts to jump-start investigations that truly matter and dramatically reduce response time by turning vast amounts of security events, network, ecosystem, and unique DNS intelligence data into a manageable set of immediate, actionable insights at AI-speed.\u00a0<\/p>\n<p>DNS Detection and Response is becoming a crucial pillar in organization\u2019s security strategies and the combination of Infoblox Threat Defense with the new SOC Insights will allow organizations to build a solid foundation to align with industry baselines such as NIST 2.0.<\/p>\n<p>SOC Insights is available now. For more information on SOC Insights and BloxOne Threat Defense capabilities, click <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\">here<\/a> or contact an Infoblox representative.<\/p>\n<style>\n.highlights-list li {\nlist-style-type:none !important;\nmargin-bottom:10px !important;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">NIST Cybersecurity Framework 2.0<\/span> Published');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On February 26, 2024, National Institute of Standards and Technology (NIST) unveiled the eagerly awaited NIST CSF 2.0, the first major update since 1.1 was released in 2018. The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":6738,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[228,997,357,189,998],"class_list":{"0":"post-9697","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-threat-defense","9":"tag-soc-insights","10":"tag-nist","11":"tag-cybersecurity","12":"tag-framework","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST Cybersecurity Framework 2.0 Published | Infoblox<\/title>\n<meta name=\"description\" content=\"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Cybersecurity Framework 2.0 Published | Infoblox\" \/>\n<meta property=\"og:description\" content=\"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T22:41:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-20T06:07:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NIST Cybersecurity Framework 2.0 Published | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"NIST Cybersecurity Framework 2.0 Published\",\"datePublished\":\"2024-03-01T22:41:13+00:00\",\"dateModified\":\"2024-03-20T06:07:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"keywords\":[\"BloxOne\u00ae Threat Defense\",\"SOC Insights\",\"NIST\",\"Cybersecurity\",\"Framework\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/\",\"name\":\"NIST Cybersecurity Framework 2.0 Published | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"datePublished\":\"2024-03-01T22:41:13+00:00\",\"dateModified\":\"2024-03-20T06:07:39+00:00\",\"description\":\"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"width\":612,\"height\":344,\"caption\":\"Male IT Engineer Works on a Laptop in front of Server Cabinet at a Big Data Center. Rows of Rack Servers are Seen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nist-cybersecurity-framework-2-0-published\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NIST Cybersecurity Framework 2.0 Published\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST Cybersecurity Framework 2.0 Published | Infoblox","description":"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/","og_locale":"en_US","og_type":"article","og_title":"NIST Cybersecurity Framework 2.0 Published | Infoblox","og_description":"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/","og_site_name":"Infoblox Blog","article_published_time":"2024-03-01T22:41:13+00:00","article_modified_time":"2024-03-20T06:07:39+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_title":"NIST Cybersecurity Framework 2.0 Published | Infoblox","twitter_description":"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"NIST Cybersecurity Framework 2.0 Published","datePublished":"2024-03-01T22:41:13+00:00","dateModified":"2024-03-20T06:07:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/"},"wordCount":741,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","keywords":["BloxOne\u00ae Threat Defense","SOC Insights","NIST","Cybersecurity","Framework"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/","url":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/","name":"NIST Cybersecurity Framework 2.0 Published | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","datePublished":"2024-03-01T22:41:13+00:00","dateModified":"2024-03-20T06:07:39+00:00","description":"The NIST Cybersecurity Framework (CSF) was officially released in 2014, and became a landmark guidance framework for reducing cybersecurity risk around the world. Developed by NIST, this framework provided a structured approach to managing and mitigating cybersecurity risks. It offered a common language, actionable guidelines, and a flexible framework that organizations could adapt to their particular situations.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","width":612,"height":344,"caption":"Male IT Engineer Works on a Laptop in front of Server Cabinet at a Big Data Center. Rows of Rack Servers are Seen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/nist-cybersecurity-framework-2-0-published\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"NIST Cybersecurity Framework 2.0 Published"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9697"}],"version-history":[{"count":10,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9697\/revisions"}],"predecessor-version":[{"id":9737,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9697\/revisions\/9737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6738"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}