Skip to main content

The Protect Function in NIST CSF 2.0: Managing the Risk of Control Effectiveness


As organizations adopt NIST Cybersecurity Framework 2.0 (CSF 2.0), the Protect function often receives the most attention—and the most budget. Controls, safeguards, and security technologies are tangible, measurable, and familiar. Yet despite significant investment, many organizations struggle to meaningfully reduce risk.

The challenge is not whether organizations implement protective controls, but how deliberately and strategically they do so. For CISOs and security leaders, the Protect function represents both an opportunity and a risk: when implemented well, it reduces the likelihood and impact of incidents; when implemented poorly—or without context—it can create a false sense of security while consuming disproportionate resources.

Official NIST CSF 2.0 guidance is available here:
https://www.nist.gov/publications/nist-cybersecurity-framework-csf-20


What the Protect Function Is (and What It Is Not)

In NIST CSF 2.0, the Protect (PR) function focuses on safeguards that ensure delivery of critical services by limiting or containing the impact of potential cybersecurity events. It encompasses outcomes related to:

  • Access control and identity management

  • Awareness and training

  • Data security

  • Platform and infrastructure protection

  • Technology configuration and resilience

Protect answers a critical question for leadership:
Given what we know about our assets and risks, what safeguards are required to reduce exposure to an acceptable level?

What Protect is not is a standalone technology catalog. Controls implemented without alignment to identified risk, business criticality, or governance priorities often underperform—despite appearing “mature” on paper.


Risk of Not Implementing Protect Effectively

Organizations that underinvest or inconsistently apply protective controls expose themselves to predictable and preventable failures.

1. Increased Likelihood of Incident Occurrence

Without baseline protections—such as strong identity controls, hardened configurations, and data protection mechanisms—organizations rely too heavily on detection and response. This significantly increases the probability of compromise through phishing, credential abuse, misconfiguration, or lateral movement.

2. Overreliance on People and Process

When technical protections are weak, organizations compensate with manual processes and human vigilance. This approach does not scale and fails under stress, turnover, or sustained attack campaigns.

3. Regulatory and Compliance Exposure

Many regulatory frameworks assume the presence of reasonable protective controls. Gaps in access control, encryption, or system hardening can quickly escalate from technical findings into legal, contractual, or audit failures.

4. Cascading Business Impact

Protective failures often turn small events into material incidents. A single misconfigured system or unprotected identity can expand rapidly across environments, affecting operations, safety, and customer trust.


Risks of Implementing Protect Poorly

Implementing the Protect function without strategic discipline introduces its own form of risk—often more subtle and harder to detect.

1. Control Proliferation Without Risk Reduction

Adding controls without eliminating outdated or ineffective ones leads to complexity, operational drag, and diminishing returns. More tools do not automatically equal better protection.

2. Misalignment With Business Priorities

Uniform controls applied across all systems ignore differences in criticality and impact. Overprotecting low-value assets while underprotecting mission-critical ones results in misallocated resources and leadership frustration.

3. Security Fatigue and Workarounds

Excessive or poorly implemented controls—particularly in identity, authentication, or endpoint protection—encourage unsafe workarounds. This erodes trust between security teams and the business.

4. False Confidence in “Coverage”

Dashboards and control counts can create the illusion of safety. Without validation, testing, and continuous tuning, organizations may believe they are protected while meaningful attack paths remain open.


Strategic Guidance for Infosec Leaders

For CISOs looking to mature their Protect function under CSF 2.0, several principles are critical:

1. Anchor Controls to Identified Risk
Every major protective investment should trace back to a risk identified in the Identify function and governed through leadership decision-making.

2. Prioritize Identity as a Control Plane
Modern attacks overwhelmingly target identity. Strong identity governance, MFA, and least privilege enforcement often provide the highest risk-reduction return.

3. Design for Usability and Resilience
Controls must be operable under real-world conditions. If they fail during incidents or disrupt critical workflows, they will be bypassed when they matter most.

4. Validate Control Effectiveness
Assume controls drift over time. Continuous testing, configuration validation, and attack-path analysis are essential to maintaining protection.

5. Integrate Protect With Detect and Respond
Protective controls should generate meaningful signals and support rapid response. Isolation between functions reduces overall effectiveness.


Final Thought

In NIST CSF 2.0, the Protect function is where strategy becomes reality. It is the most visible—and often most expensive—expression of an organization’s cybersecurity risk decisions. When driven by governance and informed by accurate risk identification, protective controls meaningfully reduce exposure and strengthen operational resilience.

When implemented without context, Protect becomes security theater: impressive on the surface, fragile underneath. For today’s CISOs, success lies not in deploying more controls, but in deploying the right controls—clearly justified, continuously validated, and aligned with what truly matters to the business.

Comments

Popular posts from this blog

The associated risks of the NIST CSF

In this series, I am hopefully going to explain the risks associated with the NIST CSF and associated controls.  I will primarily focus on NIST controls.  I intend to review each NIST CSF control individually and help understand the risks associated with not satisfying that control.  This series should help you know which controls are essential for your business when developing your profile.  The information can be further extended to developing scorecards and metrics for your information security program. 

Asset Management - Physical Devices - What do you have? Do you know?

Asset management and inventorying your physical systems, we all know we should do it, and I am sure most try.  I am not going to talk about the should have, would have or could have. Instead, I am going to focus on the risks associated with the NIST CSF control ID-AM.1.   The control simply states, “Physical devices and systems within the organization are inventoried.”  At the simplest level, this control is saying that the organization inventories all physical systems that are apart of the information system. In my opinion, the control is foundational because how can you secure something if you don't know it exists.  If you are not inventorying your systems, how do you know if they have adequate controls to protect the data and network.   If you had a breach of data, would you know what type of data was involved, or would you even know if you had a breach?  To further extend this, how can you perform a risk assessment on the system to understand and relay ...

Vulnerability Management… It’s easy - Planning

I am sure you have had either consultants, vendors, or heard at a conference that vulnerability management is foundational security control.  While I agree that it is an essential control, I also understand that it is challenging to implement.  Vulnerability management is not just to pick a tool, scan, and fix issues.  Many components make it a complicated journey.  This series will attempt to help break it down and give you ideas on how this complex service and be delivered effectively.    Planning   Objective When you start, I recommend creating a targeted objective and set of measures against your objective.   Ensure that you keep in mind your organization’s culture, politics, and risk appetite as you are developing your objective.   I have seen some target just “critical” systems for regulatory compliance, whereas others have targeted their entire enterprise.   No matter your scope, keep in mind your team’s current resource...