NIST CSF Implementation Tiers
Browse NIST CSF topics
What are NIST CSF implementation tiers?
The NIST Cybersecurity Framework (CSF) uses four implementation tiers to describe the degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the framework. The tiers range from Partial (Tier 1) to Adaptive (Tier 4) and provide context for how an organization views cybersecurity risk and the processes in place to manage that risk.
Implementation tiers are not maturity levels in the traditional sense. The NIST CSF explicitly states that tiers do not represent maturity, and organizations are not expected to progress to Tier 4 in all areas. Instead, tiers help organizations understand their current approach to cybersecurity risk management and determine whether that approach is appropriate given their threat environment, business requirements, and risk tolerance.
That said, most organizations use the tiers as a practical benchmark for measuring progress and setting improvement goals.
The four implementation tiers
Tier 1 - Partial
At Tier 1, cybersecurity risk management is ad hoc and reactive. The organization has limited awareness of cybersecurity risk and manages it on a case-by-case basis without established processes.
Risk management process: There is no formalized risk management process. Cybersecurity activities are performed irregularly and in response to specific events rather than proactively. Risk decisions are made without a systematic approach to identifying, assessing, and prioritizing risks.
Integrated risk management program: Cybersecurity is not integrated into organizational risk management. There is limited awareness at the management level of cybersecurity risks, and cybersecurity activities are not coordinated across the organization. Different departments may implement security controls independently without a unified strategy.
External participation: The organization does not understand its role in the broader ecosystem. There is little or no collaboration with external entities regarding cybersecurity threats, and the organization does not share or receive threat intelligence.
Characteristics of Tier 1 organizations:
- No documented cybersecurity policies or only outdated ones
- Incident response is improvised rather than planned
- Asset inventories are incomplete or nonexistent
- Security investments are reactive, driven by incidents or audit findings
- Little to no awareness of supply chain cybersecurity risks
Tier 2 - Risk informed
At Tier 2, the organization is aware of cybersecurity risks and has begun to formalize its risk management practices, but implementation is inconsistent and may not extend across the entire organization.
Risk management process: Risk management practices are approved by management but may not be established as organization-wide policy. Risk awareness exists, but the processes for identifying and managing risk are not consistently applied. Some risk assessments have been conducted, but they may not be comprehensive or regularly updated.
Integrated risk management program: There is some awareness of cybersecurity risk at the organizational level, but it may not be formally communicated or consistently integrated into enterprise-wide risk management. Some coordination exists between departments, but cybersecurity considerations may not factor into all business decisions.
External participation: The organization understands its role in the broader ecosystem but has not formalized its external engagement. Some informal information sharing may occur, but there is no structured participation in threat intelligence communities or supply chain risk management programs.
Characteristics of Tier 2 organizations:
- Some documented cybersecurity policies exist but are not uniformly enforced
- Risk assessments have been performed but may be outdated or incomplete
- Incident response plans exist on paper but have not been regularly tested
- Security awareness training is conducted but may be infrequent
- Some vendor risk assessment processes are in place
Tier 3 - Repeatable
At Tier 3, the organization has formalized its cybersecurity risk management practices into policies that are consistently applied across the organization. Risk management is integrated into organizational processes and regularly updated.
Risk management process: Risk management practices are formally approved, documented, and expressed as policy. Policies and procedures are regularly reviewed and updated based on changes to the threat landscape, technology, and business requirements. Risk assessments are conducted regularly and inform cybersecurity priorities and resource allocation.
Integrated risk management program: Cybersecurity risk management is integrated into organizational risk management practices. Senior leadership considers cybersecurity risk alongside other business risks. There is organization-wide awareness of cybersecurity policies, and personnel at all levels understand their cybersecurity responsibilities.
External participation: The organization actively participates in external cybersecurity communities. It receives and acts on threat intelligence from industry groups, government agencies, and information sharing organizations. Supply chain risk management practices are formalized, and the organization understands and manages the cybersecurity risks associated with its third-party relationships.
Characteristics of Tier 3 organizations:
- Comprehensive, documented cybersecurity policies consistently enforced
- Regular risk assessments that inform budgeting and prioritization
- Tested incident response plans with defined roles and playbooks
- Continuous security monitoring with SIEM and alerting capabilities
- Formal vendor risk management programs
- Regular reporting of cybersecurity posture to executive leadership
Tier 4 - Adaptive
At Tier 4, the organization adapts its cybersecurity practices based on lessons learned and predictive indicators. Cybersecurity risk management is a core part of organizational culture and decision-making.
Risk management process: The organization continuously adapts its cybersecurity practices based on real-time threat intelligence, lessons learned from incidents, and predictive analytics. Risk management is dynamic and responds to changes in the threat environment proactively rather than reactively. Technologies and processes are continuously evaluated and improved.
Integrated risk management program: Cybersecurity risk management is fully integrated into organizational culture. There is a clear understanding of risk tolerance, and cybersecurity considerations are embedded in all business decisions, from strategic planning to daily operations. Budget allocation reflects a risk-informed approach with flexibility to address emerging threats.
External participation: The organization actively contributes to the broader cybersecurity ecosystem. It shares threat intelligence, participates in industry working groups, and collaborates with partners and peers to improve collective security. Supply chain risk management is advanced, with continuous monitoring of third-party security postures.
Characteristics of Tier 4 organizations:
- Cybersecurity practices evolve based on threat intelligence and lessons learned
- Automated, continuous monitoring with advanced analytics and anomaly detection
- Mature incident response with regular exercises including tabletop and red team operations
- Cybersecurity metrics tracked and reported to the board regularly
- Active participation in ISACs and information sharing communities
- Predictive capabilities that anticipate emerging threats
Assessing your current tier
Assessing your implementation tier requires honest evaluation across three dimensions for each of the five core functions:
Step 1 - Evaluate risk management processes
Examine whether your cybersecurity risk management processes are documented, approved by leadership, consistently applied, and regularly updated. Consider the following questions:
- Do you have a formal risk management framework?
- Are risk assessments conducted regularly and used to inform security decisions?
- Is there a defined risk tolerance that guides control selection?
- Are risk management processes reviewed and updated when the threat landscape changes?
Step 2 - Assess integration with organizational risk management
Determine how deeply cybersecurity is embedded in overall business risk management:
- Does executive leadership receive regular cybersecurity risk briefings?
- Are cybersecurity considerations factored into business decisions such as new product launches, acquisitions, and vendor selections?
- Is cybersecurity funding aligned with identified risks?
- Do all departments understand their cybersecurity responsibilities?
Step 3 - Evaluate external participation
Assess your engagement with the broader cybersecurity community:
- Do you receive threat intelligence from industry groups or government sources?
- Do you share threat information with peers?
- Is supply chain cybersecurity risk formally managed?
- Do you participate in sector-specific cybersecurity initiatives?
Step 4 - Build a tier assessment matrix
For each core function (Identify, Protect, Detect, Respond, Recover), rate your organization across the three dimensions. You may be at different tiers for different functions, which is normal. Use this matrix to build a framework profile that captures your current state and defines your target state.
Progressing to higher tiers
Tier progression should be driven by business need and risk tolerance, not by a desire to achieve the highest possible tier. For many organizations, Tier 3 represents an appropriate target that balances security maturity with resource investment.
Moving from Tier 1 to Tier 2
- Document your current cybersecurity policies, even if they are informal
- Conduct an initial risk assessment to identify the most critical gaps
- Establish basic asset management practices
- Create an incident response plan, even a simple one
- Begin security awareness training for all employees
Moving from Tier 2 to Tier 3
- Formalize policies into organization-wide standards
- Implement continuous security monitoring (SIEM, EDR, vulnerability scanning)
- Integrate cybersecurity risk into enterprise risk management
- Establish a formal vendor risk management program
- Conduct regular tabletop exercises for incident response
- Report cybersecurity metrics to executive leadership
Moving from Tier 3 to Tier 4
- Implement advanced threat detection with behavioral analytics
- Develop predictive capabilities based on threat intelligence
- Conduct red team exercises and adversary emulation
- Actively contribute to information sharing communities
- Continuously optimize security controls based on performance metrics
- Embed cybersecurity decision-making into all business processes
The NIST CSF implementation tiers provide a useful vocabulary for communicating cybersecurity maturity internally and externally. They also map effectively to other frameworks, helping organizations that must meet multiple compliance requirements understand how maturity investments in one area benefit their overall posture.