NIST Cybersecurity Framework 2.0

Voluntary risk management framework widely adopted by US enterprises. Updated in 2024 to add a Govern function and expand supply chain guidance.

All US organizations, increasingly global

10

control domains mapped

10

Nitrokey products applicable

6

other frameworks cross-mapped

Official doc

NIST Cybersecurity Framework 2.0

PR.AA-03 Users, services, and hardware are authenticated

Phishing-resistant MFA using hardware security keys. Software TOTP and SMS are explicitly excluded from "phishing-resistant" in NIST 800-63B and most modern framework guidance.

PR.DS-02 Data-in-transit is protected

Hardware-bound key generation and storage. Private keys generated and stored inside a certified secure element (EAL 6+) and are non-exportable by design.

PR.AC-3 Remote access is managed

Hardened mobile OS with per-app sensor controls, verified boot, and no background telemetry. Satisfies mobile device management and bring-your-own-device security requirements.

DE.CM-09 Computing hardware and software are monitored

Measured boot chain verified on every power-on. Any firmware modification — supply chain implant, evil-maid attack, or malicious update — fails attestation before the OS loads.

PR.AC-5 Network integrity is protected (including network segregation)

VM-level compartmentalization means a compromise of one domain (e.g. browser) cannot reach another (e.g. keys, vault). No other consumer laptop provides this by default.

PR.AC-5 Network integrity is protected

Stateful firewall with IPS at the network perimeter. All inbound/outbound traffic inspected with Suricata rule sets. VPN gateway replaces consumer VPN dependency.

Products that satisfy this control:

PR.DS-01 Data-at-rest is protected

Hardware-encrypted storage and self-hosted file servers replace cloud storage with hardware you control. Encryption keys never leave your environment.

GV.SC-06 Cybersecurity risk requirements are included in contracts with suppliers

Open-source firmware is publicly auditable and reproducibly built. EU jurisdiction hardware is not subject to US National Security Letters. Directly addresses hardware supply chain risk in CMMC and NIS2.

PR.AC-2 Physical access to assets is managed and protected

Rated safes and vaults protect physical assets, documents, and hardware backups. UL-certified fire and burglary ratings provide auditable physical security controls.

Products that satisfy this control:

PR.DS-02 Data-in-transit is protected

Verified boot ensures the TLS stack is unmodified before communication. VPN gateway encrypts all remote access traffic. Hardware-backed keys prevent interception even if endpoints are observed.