ComplyGuideComplyGuide
HomeSoftwareLearn
Submit a Tool
ComplyGuideComplyGuide

Find and compare the best compliance automation tools. Trusted by thousands of compliance professionals.

Directory

  • All Vendors

Frameworks

  • SOC 2
  • HIPAA
  • GDPR
  • ISO 27001
  • PCI DSS
  • FedRAMP
  • NIST CSF

Resources

  • Learn

For Vendors

  • Submit a Tool
  • Premium Subscription
  • Claim Your Listing

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 ComplyGuide. All rights reserved.

Made for compliance professionals

Get a RecommendationBrowse Tools
Home/Learn/NIST CSF/NIST CSF Categories & Subcategories Explained
Requirements
18 min read|February 18, 2025|Reviewed: March 20, 2026

NIST CSF Categories & Subcategories Explained

Quick Answer

NIST CSF 2.0 has 22 categories and 106 subcategories organized under 6 core functions. Categories group related cybersecurity outcomes (e.g., Asset Management, Access Control), while subcategories define specific outcomes to achieve. Together they provide a detailed roadmap for cybersecurity activities.

Reviewed by ComplyGuide Editorial Team·Updated February 18, 2025

NIST CSF Category Structure

The NIST CSF Core is organized in a hierarchy: Functions → Categories → Subcategories. Functions (6) provide the highest-level view. Categories (22) group related activities within each function. Subcategories (106) define specific outcomes that, when achieved together, build a comprehensive cybersecurity program.

Key Takeaways

  • CSF 2.0 has 6 functions, 22 categories, and 106 subcategories
  • Each subcategory describes a specific cybersecurity outcome to achieve
  • Subcategories include informative references linking to other standards (800-53, ISO 27001, CIS)
  • Not all subcategories apply to every organization — select based on your risk profile
  • Implementation examples (new in 2.0) show how to achieve each subcategory in practice

Categories by Function

NIST CSF 2.0 Complete Category List
FunctionCategory IDCategory NameSubcategories
GovernGV.OCOrganizational Context5
GovernGV.RMRisk Management Strategy7
GovernGV.RRRoles, Responsibilities, and Authorities4
GovernGV.POPolicy2
GovernGV.OVOversight3
GovernGV.SCCybersecurity Supply Chain Risk Management10
IdentifyID.AMAsset Management7
IdentifyID.RARisk Assessment10
IdentifyID.IMImprovement4
ProtectPR.AAIdentity Management, Authentication, and Access Control6
ProtectPR.ATAwareness and Training2
ProtectPR.DSData Security10
ProtectPR.PSPlatform Security6
ProtectPR.IRTechnology Infrastructure Resilience4
DetectDE.CMContinuous Monitoring9
DetectDE.AEAdverse Event Analysis8
RespondRS.MAIncident Management5
RespondRS.ANIncident Analysis8
RespondRS.COIncident Response Reporting and Communication3
RespondRS.MIIncident Mitigation2
RecoverRC.RPIncident Recovery Plan Execution6
RecoverRC.COIncident Recovery Communication4

How to Use Categories and Subcategories

Working with CSF Categories

1
Start at the function level

Understand what each of the six functions covers and how they apply to your organization.

2
Review applicable categories

Within each function, identify which categories are relevant to your business, risk profile, and regulatory requirements.

3
Assess at the subcategory level

For each relevant category, evaluate your current state against each subcategory. This is where the detailed assessment happens.

4
Use informative references

Each subcategory maps to specific controls in other frameworks (NIST 800-53, ISO 27001, CIS Controls). Use these to identify specific implementation steps.

5
Reference implementation examples

CSF 2.0 provides implementation examples for each subcategory showing practical ways to achieve the outcome.

Key Categories Deep Dive

Asset Management (ID.AM)

Asset Management is foundational — you cannot protect what you do not know you have. ID.AM requires inventorying hardware, software, data, external services, and understanding the business criticality of each asset.

Access Control (PR.AA)

Identity management and access control is one of the most impactful categories. It covers identity lifecycle management, authentication (including MFA), access permissions, and credential management.

Continuous Monitoring (DE.CM)

Continuous Monitoring is often the largest gap in organizations. DE.CM requires monitoring networks, personnel activity, external service providers, and computing hardware for cybersecurity events.

Supply Chain Risk Management (GV.SC)

New in CSF 2.0, GV.SC has 10 subcategories covering supply chain risk identification, due diligence, contractual requirements, and ongoing monitoring of suppliers and service providers.

ℹ️ Informative References

Every subcategory includes informative references — mappings to specific controls in other standards. For example, PR.AA-01 maps to NIST 800-53 AC-1, AC-2, IA-1, and ISO 27001 A.5.15-A.5.18. These references provide the specific 'how' behind each CSF outcome.

Do I need to implement all 106 subcategories?

No. NIST CSF is designed to be customized. Select subcategories based on your risk assessment, business requirements, and regulatory obligations. A small business might focus on 30-40 high-priority subcategories, while a large enterprise might address all 106.

How do categories map to other frameworks?

NIST provides detailed mappings through informative references. For example, Protect categories map to ISO 27001 Annex A controls, SOC 2 Trust Service Criteria, PCI DSS requirements, and HIPAA safeguards. GRC platforms automate these mappings.

What changed in categories from CSF 1.1 to 2.0?

CSF 2.0 reorganized several categories, added the entire Govern function (6 new categories), and consolidated some subcategories. The total went from 23 categories to 22, and from 108 subcategories to 106, but the Govern function adds significant new content.

How detailed should my assessment be at the subcategory level?

For each applicable subcategory, document: (1) your current state (not implemented, partial, largely, fully), (2) evidence supporting the assessment, (3) target state, and (4) gap/action items if any. This level of detail enables actionable gap analysis.

Map Your Controls to NIST CSF

Find GRC tools that automatically map your security controls to NIST CSF categories and subcategories.

Browse NIST CSF Tools
NIST CSF
categories
subcategories
security controls

On this page

NIST CSF Category StructureCategories by FunctionHow to Use Categories and SubcategoriesKey Categories Deep DiveAsset Management (ID.AM)Access Control (PR.AA)Continuous Monitoring (DE.CM)Supply Chain Risk Management (GV.SC)

NIST CSF Tools & Comparisons

Explore NIST CSF compliance tools, pricing, and side-by-side comparisons.

Best NIST CSF ToolsAll NIST CSF VendorsMore NIST CSF Guides

Related Articles

Requirements
16 min read

NIST CSF Core Functions Explained: Govern, Identify, Protect, Detect, Respond, Recover

The NIST CSF organizes cybersecurity into six core functions: Govern (strategy and governance), Identify (understand risk posture), Protect (implement safeguards), Detect (discover events), Respond (take action on incidents), and Recover (restore services). Together they cover the full cybersecurity lifecycle.

Overview
15 min read

What Is the NIST Cybersecurity Framework? A Complete Guide

The NIST Cybersecurity Framework (CSF) is a voluntary set of guidelines, standards, and best practices created by the National Institute of Standards and Technology to help organizations manage and reduce cybersecurity risk. It organizes cybersecurity activities into six core functions: Govern, Identify, Protect, Detect, Respond, and Recover.

Requirements
14 min read

NIST CSF 2.0: What's New & Key Changes from Version 1.1

NIST CSF 2.0 (released February 2024) adds a sixth core function (Govern), expands scope to all organizations (not just critical infrastructure), enhances supply chain risk management, introduces community profiles, and adds implementation examples. It is the first major update since the framework launched in 2014.