Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    hack23

    nist-csf-mapping

    hack23/nist-csf-mapping
    Security
    205
    2 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    Map CIA platform security controls to NIST Cybersecurity Framework functions: Identify, Protect, Detect, Respond, Recover

    SKILL.md


    name: nist-csf-mapping description: Map CIA platform security controls to NIST Cybersecurity Framework functions: Identify, Protect, Detect, Respond, Recover license: Apache-2.0

    NIST Cybersecurity Framework Mapping Skill

    Purpose

    Map security implementations to NIST CSF 2.0 framework functions and categories, ensuring comprehensive cybersecurity coverage.

    When to Use

    • ✅ Security architecture reviews
    • ✅ Compliance assessments
    • ✅ Risk management activities
    • ✅ Security control implementation

    NIST CSF Core Functions

    IDENTIFY (ID)

    ID.AM - Asset Management

    # Document all assets
    assets:
      - Application: CIA Web Platform
        Classification: Critical
        Owner: Development Team
        Data: Political intelligence, user data
    

    ID.RA - Risk Assessment

    • Conduct threat modeling (STRIDE)
    • Annual risk assessments
    • Vulnerability scanning

    PROTECT (PR)

    PR.AC - Identity Management and Access Control

    @Configuration
    @EnableWebSecurity
    public class AccessControlConfig {
        @Bean
        public SecurityFilterChain filterChain(HttpSecurity http) {
            http.authorizeHttpRequests(auth -> auth
                .requestMatchers("/admin/**").hasRole("ADMIN")
                .requestMatchers("/api/**").authenticated()
                .anyRequest().permitAll()
            );
            return http.build();
        }
    }
    

    PR.DS - Data Security

    • Encryption at rest (AES-256)
    • Encryption in transit (TLS 1.3)
    • Data classification enforcement

    DETECT (DE)

    DE.CM - Security Continuous Monitoring

    @Service
    public class SecurityMonitoringService {
        @Scheduled(fixedRate = 60000) // Every minute
        public void monitorSecurityEvents() {
            List<SecurityEvent> events = securityEventRepository.findRecent();
            for (SecurityEvent event : events) {
                if (event.isSuspicious()) {
                    alertService.raiseAlert(event);
                }
            }
        }
    }
    

    RESPOND (RS)

    RS.AN - Analysis

    • Incident classification
    • Root cause analysis
    • Impact assessment

    RS.MI - Mitigation

    • Incident containment
    • System isolation
    • Evidence preservation

    RECOVER (RC)

    RC.RP - Recovery Planning

    • Backup and restore procedures
    • Disaster recovery plan
    • Business continuity plan

    Implementation Checklist

    • ✅ Identify all assets
    • ✅ Implement access controls
    • ✅ Enable logging and monitoring
    • ✅ Define incident response procedures
    • ✅ Test recovery procedures

    Hack23 ISMS Policy References

    NIST CSF Framework Implementation:

    • Information Security Strategy - Strategic CSF alignment
    • Information Security Policy - Governance framework (GV)
    • Risk Assessment Methodology - Identify function (ID)
    • Access Control Policy - Protect function (PR.AC)
    • Cryptography Policy - Data security (PR.DS)
    • Secure Development Policy - Platform security (PR.IP)
    • Vulnerability Management - Detect function (DE.CM)
    • Incident Response Plan - Respond function (RS)
    • Business Continuity Plan - Recover function (RC)
    • Backup Recovery Policy - Recovery planning (RC.RP)
    • Change Management - Configuration management (PR.IP)

    All Hack23 ISMS Policies: https://github.com/Hack23/ISMS-PUBLIC

    CIA Platform Architecture References

    • Security Architecture: CIA SECURITY_ARCHITECTURE.md - CSF control implementation
    • Threat Model: CIA THREAT_MODEL.md - Risk identification (ID.RA)

    References

    • NIST CSF 2.0: https://www.nist.gov/cyberframework
    • NIST CSF Implementation Guide: https://doi.org/10.6028/NIST.CSWP.29
    • ISO 27001:2022: https://www.iso.org/standard/27001
    • CIS Controls v8.1: https://www.cisecurity.org/controls
    Recommended Servers
    Agent Safe Message MCP
    Agent Safe Message MCP
    Repository
    hack23/cia
    Files