NIST CSF

Skill packages tagged with “NIST CSF”

CIS Benchmark Mapper

Draft Secure Configuration Baselines (hardening guides) from CIS Benchmarks or STIGs into formal policy. Validates recurring Drift Analysis schedule (NIST CSF 2.0 PR.PS).

    Learn More
    Crypto Spec Generator

    Draft and validate Cryptographic Key Management & Encryption Standard (NIST CSF 2.0 PR.DS). Ensures FIPS 140-3–aligned algorithms and key lifecycle; flags legacy algorithms (SHA-1, 3DES, etc.) for 2026-era compliance.

      Learn More
      Incident Decision Tree Builder

      Draft scenario-specific incident response playbooks (NIST CSF RS.RP) with a clear Decision Matrix for isolate vs. monitor and logic gates for Containment, Eradication, and Recovery. Inserts or validates mandatory regulatory reporting windows (e.g. GDPR 72h, SEC 4 days) in the playbook timeline.

        Learn More
        MITRE ATT&CK Mapper

        Document SIEM alert logic and map alerts to MITRE ATT&CK® techniques (DE.AE). Suggests Detection Logic (e.g. Sigma rules) for Process Injection, Credential Dumping, and related threats; validates Threshold and Suppression/Contextualization to reduce alert fatigue.

          Learn More
          NIST CSF Profile Author

          Guided elaboration of a NIST Cybersecurity Framework (CSF) assessment: current profile (Identify, Protect, Detect, Respond, Recover, Govern), target profile, gap analysis, and prioritized implementation plan with outcomes and metrics.

            Learn More
            Restoration Dependency Analyzer (NIST RC.RP)

            Draft and validate System Restoration Sequence & Integrity Verification plans aligned with NIST CSF 2.0 RC.RP. Ensures restoration order respects service dependencies and that backup verification and security integrity checks are explicit before go-live.

              Learn More
              Risk Tolerance Quantifier

              Draft and validate a Cybersecurity Risk Appetite Statement (NIST CSF 2.0 GV.OC): translate board mandates into quantifiable tolerance levels and KPIs; ensure stated appetite is supported by budget narratives.

                Learn More
                SBOM Lifecycle Drafter

                Draft and maintain the SBOM Management Procedure aligned with NIST CSF 2.0 ID.AM. Covers ingestion, validation, and monitoring of SBOMs; Vulnerability Disclosure when NVD flags a component; and developer Attestation of Security. Validates procedure and SBOM files against CycloneDX/SPDX.

                  Learn More
                  Supply Chain Clause Harmonizer

                  Draft and validate C-SCRM Security Requirement Annexes for vendor contracts. Selects clauses by Criticality Tier (right to audit, vulnerability disclosure, breach notification) and validates against NIST SP 800-161 (GV.SC).

                    Learn More
                    Threat Impact Narrative Builder

                    Build and validate cybersecurity risk registers and impact narratives aligned to NIST CSF 2.0 ID.RA. Uses FAIR methodology for impact scenarios and enforces consistency between risk scores and Historical Incident Data.

                      Learn More

                      Ready to let your expertise drive the workflow?

                      Stop wrestling with rigid templates and complex tooling. Write your process in markdown, let the agent handle the rest.

                      Get Started