NIST CSF 2.0 → BSI IT-Grundschutz Mapping

Cross-reference mapping between NIST Cybersecurity Framework 2.0 subcategories and BSI IT-Grundschutz building blocks.

This page maps NIST Cybersecurity Framework 2.0 subcategories to BSI IT-Grundschutz building blocks. NIST CSF 2.0 provides a taxonomy of cybersecurity outcomes across six core functions: Govern, Identify, Protect, Detect, Respond, and Recover.

DE.AE-03 Information is correlated from multiple sources
DE.AE-04 The estimated impact and scope of adverse events are understood
DE.AE-06 Information on adverse events is provided to authorized staff and tools
DE.AE-07 Cyber threat intelligence and other contextual information are integrated into the analysis of adverse events
DE.CM-02 The physical environment is monitored to find potentially adverse events
DE.CM-03 Personnel activity and technology usage are monitored to find potentially adverse events
DE.CM-06 External service provider activities and services are monitored to find potentially adverse events
GV.OC-01 The organizational mission is understood and informs cybersecurity risk management
GV.OC-03 Legal, regulatory, and contractual requirements regarding cybersecurity — including privacy and civil liberties obligations — are understood and managed
GV.OV-01 Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
GV.OV-02 The cybersecurity risk management strategy is reviewed and adjusted to ensure its continued utility
GV.PO-02 Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced
GV.RM-01 Risk management objectives are established and agreed to by organizational stakeholders
GV.RM-06 A standardized process for communicating cybersecurity risks is established and used
GV.RR-01 Organizational leadership is responsible and accountable for cybersecurity risk
GV.RR-02 Roles, responsibilities, and authorities related to cybersecurity risk management are established
GV.SC-01 A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
GV.SC-03 Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
GV.SC-04 Suppliers are known and prioritized by criticality
GV.SC-05 Requirements to address cybersecurity risks in supply chains are established
GV.SC-06 Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
GV.SC-07 Risks posed by suppliers, their products and services, and other third parties are understood
GV.SC-09 Supply chain security practices are integrated into cybersecurity and enterprise risk management programs
GV.SC-10 Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
ID.AM-01 Inventories of hardware managed by the organization are maintained
ID.AM-02 Inventories of software, services, and systems managed by the organization are maintained
ID.AM-03 Representations of the organization's authorized network communication and internal and external network data flows are maintained
ID.AM-05 Assets are prioritized based on classification, criticality, resources, and impact on the mission
ID.IM-02 Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
ID.IM-03 Improvements are identified from execution of operational processes and procedures
ID.RA-01 Vulnerabilities in assets are identified, validated, and recorded
ID.RA-03 Internal and external threats to the organization are identified and recorded
PR.AA-01 Identities and credentials for authorized users, services, and hardware are managed by the organization
PR.AA-02 Identities are proofed and bound to credentials based on the context of interactions
PR.AT-01 Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
PR.AT-02 Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks
PR.DS-03 Assets are formally managed throughout removal, transfers, and disposition
PR.DS-10 The confidentiality, integrity, and availability of data-in-use are protected
PR.DS-11 Backups of data are created, protected, maintained, and tested
PR.IR-03 The organization's communications and technology infrastructure is prepared for impairment or failures
PR.IR-04 Adequate resource capacity to ensure availability is maintained
PR.PS-04 Log records are generated to enable monitoring, forensics, and incident response
RC.RP-02 Recovery actions are selected, scoped, prioritized, and performed
RC.RP-03 The integrity of backups and other restoration assets is verified before using them in restoration
RS.AN-03 Analysis is performed to establish what has occurred during an incident
RS.AN-06 Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved
RS.CO-02 Internal and external stakeholders are notified of incidents in a timely manner
RS.MA-01 The incident response plan is executed in coordination with relevant third parties once an incident is declared
RS.MA-04 Incidents are categorized and classified

These mappings are provided for reference and do not replace a professional compliance assessment.