Blogs | 6clicks

NIST CSF 2.0 and the Cyber AI Profile: how to prepare your GRC program now

Written by Heather Buker | May 18, 2026

TL;DR

 

  • NIST released two new CSF 2.0 Quick-Start Guides in early 2026 covering enterprise risk management and implementation pathways for diverse audiences (NIST CSF 2.0 Quick Start Guides).
  • The draft NIST Cyber AI Profile (NIST IR 8596) maps AI-specific risks to CSF 2.0 functions, addressing securing AI components, using AI for cyber defense, and countering AI-boosted attacks.
  • NIST CSF 2.0 introduced a new Govern function, a sixth core function requiring organizations to establish and monitor cybersecurity governance structures, including for AI (NIST CSF 2.0).
  • OWASP maintains a Top 10 list of the most critical risks for LLM applications (OWASP Top 10 for LLM Applications), expanding the cybersecurity and governance considerations organizations need to address when using large language models.
  • If you are using NIST CSF 2.0: your GRC program must now account for AI-specific control requirements.

NIST released the draft Cyber AI Profile (NIST IR 8596) in December 2025 and two new CSF 2.0 Quick-Start Guides in early 2026, marking the formal arrival of AI-specific cybersecurity controls in the world's most widely adopted security framework. Organizations that have already implemented CSF 2.0 must now assess how their GRC programs handle AI-specific risks, and those still on CSF 1.1 face a compounding gap.

 

 

What changed in NIST CSF 2.0 that matters for GRC teams

NIST CSF 2.0, released in February 2024, made two structural changes that GRC teams are still catching up with in 2026:

 

CSF 2.0 added a sixth core function, Govern, sitting alongside Identify, Protect, Detect, Respond, and Recover. The Govern function requires organizations to establish, communicate, and monitor cybersecurity risk management strategy, expectations, and policy across the enterprise. This is not optional augmentation; it is a core framework function that must be evidenced and monitored.

 

For GRC programs still mapped to CSF 1.1, the Govern function represents a structural gap. Control mappings, evidence libraries, and assessment questionnaires built for CSF 1.1 do not cover Govern requirements. Organizations that have not updated their GRC frameworks to CSF 2.0 have an unmapped compliance exposure.

 

NIST’s ongoing expansion of CSF 2.0 informative references, including guidance relevant to finance, manufacturing, telecom, and AI, means organizations in these sectors are seeing increasing specificity around how cybersecurity risk management should be applied in their industry contexts. Meanwhile, OWASP’s LLM Top 10 highlights the growing need for AI-specific security controls and governance practices that organizations can align with broader CSF 2.0 cybersecurity outcomes.

 

Understanding the Cyber AI Profile: three AI cybersecurity focus
areas

The draft NIST Cyber AI Profile applies CSF 2.0 to three distinct AI cybersecurity focus areas:

 

1. Securing AI components

 

AI systems, including models, training pipelines, APIs, agents, and inference infrastructure, introduce novel and expanded attack surfaces that organizations must address within existing cybersecurity programs. The Cyber AI Profile includes guidance related to adversarial inputs, data poisoning, model security, supply chain risk, and protection of AI systems and supporting infrastructure.

 

2. Conducting AI-enabled cyber defense

 

Organizations are increasingly using AI to support threat detection, anomaly detection, investigations, and automated response workflows. The Profile addresses governance, oversight, reliability, and operational considerations for AI-enabled defensive capabilities, including human oversight, model drift, and confidence validation.

 

3. Thwarting AI-enabled cyber attacks

 

Threat actors are using AI to accelerate phishing, social engineering, malware development, reconnaissance, and attack automation. The Profile focuses on helping organizations build resilience against AI-enabled threats through updated defensive practices, training, detection, and response capabilities.

How to map your GRC program to NIST CSF 2.0 and the Cyber AI
Profile

For organizations already operating a NIST CSF-aligned GRC program, the path to CSF 2.0 and Cyber AI Profile alignment follows four steps:

 

  1. Gap assessment against the Govern function - Identify which existing controls partially or fully satisfy Govern requirements, and which represent new evidence obligations
  2. AI inventory and risk classification - Identify all AI systems, models, and tools in your environment and classify them against the three Cyber AI Profile focus areas
  3. Control mapping update - Map existing controls, governance processes, and cybersecurity activities against the Cyber AI Profile’s AI-specific considerations and prioritized CSF 2.0 outcomes
  4. Evidence workflow update - Add evidence collection requirements for AI-specific controls, including validation logs, model governance documentation, and AI incident records

Without a GRC platform that supports dynamic control library updates and multi-framework mapping, this process typically takes months and generates significant documentation debt.

 

How 6clicks helps organizations align with NIST CSF 2.0 and the
Cyber AI Profile

6clicks maintains an active content library that includes NIST CSF 2.0 controls, including the Govern function, and is tracking the Cyber AI Profile as it moves from draft to final publication. Practical capabilities include:

 

  • Ready-to-use NIST CSF 2.0 framework, including pre-mapped control sets and assessment templates
  • AI governance framework support covering NIST AI RMF, ISO/IEC 42001, and the EU AI Act
  • Multi-framework mapping: Organizations implementing CSF 2.0 alongside ISM, Essential Eight, or ISO 27001 assess once and satisfy multiple frameworks simultaneously
  • Hailey AI for control gap identification: Automatically surfaces control gaps as framework updates are released, reducing the manual burden of keeping GRC programs current
  • Sovereign deployment for government agencies and classified environments where NIST CSF compliance programs must operate within sovereign infrastructure

Always audit-ready means your NIST CSF 2.0 compliance posture is visible in real time — not reconstructed at audit time.

 

Frequently asked questions

Next step

If your GRC program has not yet incorporated the NIST CSF 2.0 Govern function or begun mapping to the Cyber AI Profile, now is the time to act, not after the Profile is finalized. Book a demo of 6clicks to see how automated framework mapping and real-time gap tracking keep your NIST CSF 2.0 program always audit-ready.