NIST CSF

Skill packages tagged with “NIST CSF”

CIS Benchmark Mapper

Draft Secure Configuration Baselines (hardening guides) from CIS Benchmarks or STIGs into formal policy. Validates recurring Drift Analysis schedule (NIST CSF 2.0 PR.PS).

    Learn More
    Crypto Spec Generator

    Draft and validate Cryptographic Key Management & Encryption Standard (NIST CSF 2.0 PR.DS). Ensures FIPS 140-3–aligned algorithms and key lifecycle; flags legacy algorithms (SHA-1, 3DES, etc.) for 2026-era compliance.

      Learn More
      Incident Decision Tree Builder

      Draft scenario-specific incident response playbooks (NIST CSF RS.RP) with a clear Decision Matrix for isolate vs. monitor and logic gates for Containment, Eradication, and Recovery. Inserts or validates mandatory regulatory reporting windows (e.g. GDPR 72h, SEC 4 days) in the playbook timeline.

        Learn More
        MITRE ATT&CK Mapper

        Document SIEM alert logic and map alerts to MITRE ATT&CK® techniques (DE.AE). Suggests Detection Logic (e.g. Sigma rules) for Process Injection, Credential Dumping, and related threats; validates Threshold and Suppression/Contextualization to reduce alert fatigue.

          Learn More
          NIST CSF Profile Author

          Guided elaboration of a NIST Cybersecurity Framework (CSF) assessment: current profile (Identify, Protect, Detect, Respond, Recover, Govern), target profile, gap analysis, and prioritized implementation plan with outcomes and metrics.

            Learn More
            NIST SP 800-53 / CSF Crosswalk

            Bidirectional crosswalk between NIST Cybersecurity Framework (CSF) 2.0 subcategories and SP 800-53 Rev 5 controls. Maps CSF subcategories to 800-53 controls and vice versa, identifies gaps in either direction, and produces a crosswalk document for dual-framework compliance.

              Learn More
              Restoration Dependency Analyzer (NIST RC.RP)

              Draft and validate System Restoration Sequence & Integrity Verification plans aligned with NIST CSF 2.0 RC.RP. Ensures restoration order respects service dependencies and that backup verification and security integrity checks are explicit before go-live.

                Learn More
                Risk Tolerance Quantifier

                Draft and validate a Cybersecurity Risk Appetite Statement (NIST CSF 2.0 GV.OC): translate board mandates into quantifiable tolerance levels and KPIs; ensure stated appetite is supported by budget narratives.

                  Learn More
                  SBOM Lifecycle Drafter

                  Draft and maintain the SBOM Management Procedure aligned with NIST CSF 2.0 ID.AM. Covers ingestion, validation, and monitoring of SBOMs; Vulnerability Disclosure when NVD flags a component; and developer Attestation of Security. Validates procedure and SBOM files against CycloneDX/SPDX.

                    Learn More
                    Supply Chain Clause Harmonizer

                    Draft and validate C-SCRM Security Requirement Annexes for vendor contracts. Selects clauses by Criticality Tier (right to audit, vulnerability disclosure, breach notification) and validates against NIST SP 800-161 (GV.SC).

                      Learn More
                      Threat Impact Narrative Builder

                      Build and validate cybersecurity risk registers and impact narratives aligned to NIST CSF 2.0 ID.RA. Uses FAIR methodology for impact scenarios and enforces consistency between risk scores and Historical Incident Data.

                        Learn More

                        Ready to let your expertise drive the workflow?

                        Stop wrestling with rigid templates and generic chatbots. Describe your process, let the agent handle the rest.

                        Get Started Free — No Sign-Up