Mapping: Nexus SecOps ↔ NIST CSF 2.0
This document maps Nexus SecOps benchmark controls to NIST Cybersecurity Framework 2.0 subcategories. Use this mapping to demonstrate how Nexus SecOps controls satisfy CSF 2.0 requirements, or to identify Nexus SecOps controls that address specific CSF gaps.
NIST CSF 2.0 Functions: GV (Govern), ID (Identify), PR (Protect), DE (Detect), RS (Respond), RC (Recover)
GV — Govern
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| GV.OC-01 | Organizational mission and objectives | Nexus SecOps-201, Nexus SecOps-202 |
| GV.OC-04 | Organizational objectives, stakeholders communicated | Nexus SecOps-201, Nexus SecOps-211 |
| GV.OC-05 | Outcomes, capabilities, services for supply chain | Nexus SecOps-204 |
| GV.RM-01 | Risk management objectives established | Nexus SecOps-201, Nexus SecOps-209 |
| GV.RM-02 | Risk appetite and tolerance | Nexus SecOps-201, Nexus SecOps-207 |
| GV.RM-04 | Strategic direction for risk management | Nexus SecOps-201, Nexus SecOps-207 |
| GV.RM-06 | Risk management process is established | Nexus SecOps-207, Nexus SecOps-208 |
| GV.RM-07 | Risk management overseen by senior leaders | Nexus SecOps-201, Nexus SecOps-211 |
| GV.PO-01 | Organizational cybersecurity policy established | Nexus SecOps-201 |
| GV.PO-02 | Cybersecurity roles and responsibilities assigned | Nexus SecOps-203, Nexus SecOps-205 |
| GV.AT-01 | Security awareness training provided | Nexus SecOps-206, Nexus SecOps-220 |
| GV.AT-02 | Personnel trained in roles and responsibilities | Nexus SecOps-206, Nexus SecOps-061 |
| GV.OV-01 | Cybersecurity risk management review | Nexus SecOps-207, Nexus SecOps-210 |
| GV.OV-02 | Cybersecurity risk updated with lessons learned | Nexus SecOps-072, Nexus SecOps-220 |
| GV.SC-01 | Supply chain cybersecurity established | Nexus SecOps-204 |
| GV.SC-03 | Supplier practices evaluated | Nexus SecOps-204 |
ID — Identify
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| ID.AM-01 | Software asset inventory | Nexus SecOps-001, Nexus SecOps-151 |
| ID.AM-02 | Hardware asset inventory | Nexus SecOps-001, Nexus SecOps-136 |
| ID.AM-04 | External information systems cataloged | Nexus SecOps-001, Nexus SecOps-204 |
| ID.AM-05 | Resources prioritized by classification | Nexus SecOps-030, Nexus SecOps-207 |
| ID.AM-07 | Inventories of data and corresponding metadata | Nexus SecOps-027, Nexus SecOps-030 |
| ID.AM-08 | Systems, hardware, software, services, data managed | Nexus SecOps-001, Nexus SecOps-015 |
| ID.RA-01 | Asset vulnerabilities identified | Nexus SecOps-151, Nexus SecOps-152 |
| ID.RA-02 | Threat and vulnerability information received | Nexus SecOps-081, Nexus SecOps-082 |
| ID.RA-03 | Threats identified and documented | Nexus SecOps-081, Nexus SecOps-089 |
| ID.RA-04 | Potential business impacts and likelihoods identified | Nexus SecOps-207, Nexus SecOps-208 |
| ID.RA-05 | Threats, vulnerabilities, likelihoods, impacts prioritized | Nexus SecOps-207, Nexus SecOps-087 |
| ID.RA-06 | Risk responses identified, prioritized, planned | Nexus SecOps-207, Nexus SecOps-208 |
| ID.RA-07 | Changes identified and assessed | Nexus SecOps-202, Nexus SecOps-203 |
| ID.IM-01 | Improvements identified | Nexus SecOps-220, Nexus SecOps-072 |
| ID.IM-02 | Effective security practices shared | Nexus SecOps-088, Nexus SecOps-220 |
PR — Protect
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| PR.AA-01 | Identities and credentials managed | Nexus SecOps-111, Nexus SecOps-112 |
| PR.AA-02 | Identities proofed and bound to credentials | Nexus SecOps-111, Nexus SecOps-113 |
| PR.AA-03 | Users authenticated | Nexus SecOps-111, Nexus SecOps-113 |
| PR.AA-05 | Access permissions managed | Nexus SecOps-111, Nexus SecOps-114 |
| PR.AA-06 | Physical access managed | Nexus SecOps-213 |
| PR.AT-01 | Workforce trained | Nexus SecOps-061, Nexus SecOps-206 |
| PR.DS-01 | Data at rest protected | Nexus SecOps-005, Nexus SecOps-215 |
| PR.DS-02 | Data in transit protected | Nexus SecOps-003, Nexus SecOps-215 |
| PR.DS-07 | Development and testing environments separate | Nexus SecOps-202 |
| PR.DS-08 | Integrity checking mechanisms used | Nexus SecOps-005, Nexus SecOps-023 |
| PR.IR-01 | Networks and environments protected | Nexus SecOps-121, Nexus SecOps-137 |
| PR.IR-02 | Technologies designed and managed for security | Nexus SecOps-202, Nexus SecOps-204 |
| PR.PS-01 | Configurations established and maintained | Nexus SecOps-136, Nexus SecOps-137 |
| PR.PS-02 | Software maintained | Nexus SecOps-151, Nexus SecOps-153 |
| PR.PS-03 | Computer hardware maintained | Nexus SecOps-136, Nexus SecOps-151 |
| PR.PS-04 | Logs collected | Nexus SecOps-001 through Nexus SecOps-015 |
DE — Detect
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| DE.CM-01 | Networks monitored | Nexus SecOps-001, Nexus SecOps-008, Nexus SecOps-013 |
| DE.CM-02 | Physical environment monitored | Nexus SecOps-213 |
| DE.CM-03 | Personnel activity monitored | Nexus SecOps-049, Nexus SecOps-119, Nexus SecOps-120 |
| DE.CM-06 | External service provider activities monitored | Nexus SecOps-204, Nexus SecOps-008 |
| DE.CM-09 | Computing hardware and software monitored | Nexus SecOps-010, Nexus SecOps-136, Nexus SecOps-140 |
| DE.AE-02 | Anomalous, potentially adversarial activity analyzed | Nexus SecOps-031, Nexus SecOps-044, Nexus SecOps-051 |
| DE.AE-03 | Event data aggregated and correlated | Nexus SecOps-015, Nexus SecOps-046, Nexus SecOps-064 |
| DE.AE-04 | Estimated impact and scope determined | Nexus SecOps-051, Nexus SecOps-066, Nexus SecOps-067 |
| DE.AE-06 | Information shared with designated parties | Nexus SecOps-069, Nexus SecOps-088 |
| DE.AE-07 | Cyber threat intelligence is integrated | Nexus SecOps-083, Nexus SecOps-085, Nexus SecOps-093 |
| DE.AE-08 | Incidents declared and reported | Nexus SecOps-066, Nexus SecOps-067, Nexus SecOps-073 |
RS — Respond
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| RS.MA-01 | Incident response executed | Nexus SecOps-066, Nexus SecOps-070 |
| RS.MA-02 | Incident reports triaged | Nexus SecOps-051, Nexus SecOps-053, Nexus SecOps-067 |
| RS.MA-03 | Incidents categorized and escalated | Nexus SecOps-056, Nexus SecOps-067, Nexus SecOps-068 |
| RS.MA-04 | Incidents responded to | Nexus SecOps-070, Nexus SecOps-096, Nexus SecOps-097 |
| RS.MA-05 | Criteria for escalation established | Nexus SecOps-056, Nexus SecOps-066 |
| RS.AN-03 | Analysis performed to establish what occurred | Nexus SecOps-058, Nexus SecOps-064, Nexus SecOps-065 |
| RS.AN-06 | Actions taken collected | Nexus SecOps-071, Nexus SecOps-102 |
| RS.AN-07 | Cause of the incident estimated | Nexus SecOps-058, Nexus SecOps-072 |
| RS.AN-08 | Magnitude of the incident understood | Nexus SecOps-066, Nexus SecOps-067 |
| RS.CO-02 | Internal and external stakeholders notified | Nexus SecOps-069, Nexus SecOps-073 |
| RS.CO-03 | Information shared with designated parties | Nexus SecOps-069, Nexus SecOps-088 |
| RS.MI-01 | Incidents contained | Nexus SecOps-070, Nexus SecOps-106, Nexus SecOps-137 |
| RS.MI-02 | Incidents eradicated | Nexus SecOps-070, Nexus SecOps-080 |
RC — Recover
| CSF 2.0 Subcategory | Description | Nexus SecOps Controls |
| RC.RP-01 | Recovery plan executed during or after incident | Nexus SecOps-066, Nexus SecOps-080 |
| RC.RP-03 | Recovery activities prioritized | Nexus SecOps-066, Nexus SecOps-207 |
| RC.RP-04 | Criteria for restoring operations defined | Nexus SecOps-080 |
| RC.RP-05 | Recovery actions selected | Nexus SecOps-066, Nexus SecOps-080 |
| RC.CO-03 | Recovery activities communicated | Nexus SecOps-069, Nexus SecOps-079 |
| RC.CO-04 | Public updates on recovery | Nexus SecOps-069 |
Coverage Summary
| CSF Function | CSF Subcategories | Nexus SecOps Controls Addressing |
| Govern (GV) | 15 | Nexus SecOps-201–220 (GOV domain) |
| Identify (ID) | 15 | Nexus SecOps-001, 027, 081, 151, 207 (TEL, CTI, VUL, GOV) |
| Protect (PR) | 16 | Nexus SecOps-003, 005, 111, 121, 136, 151, 206 |
| Detect (DE) | 11 | Nexus SecOps-001–050 (TEL, DQN, DET domains) |
| Respond (RS) | 13 | Nexus SecOps-051–110 (TRI, INC, AUT domains) |
| Recover (RC) | 6 | Nexus SecOps-066, 069, 080 (INC domain) |
Overall Nexus SecOps → NIST CSF 2.0 alignment: High. All six CSF functions are addressed. The TEL, DET, and INC domains provide the deepest coverage for DE, RS, and RC functions respectively.
See Controls Catalog for full control definitions. See Mapping: MITRE ATT&CK for threat-centric coverage.