How NIST CSF 2.0 Gives Local Governments a Fighting Chance
Cybercriminals follow opportunity. And for the better part of a decade, they have increasingly turned their attention to local government for a straightforward reason: high-value data, essential public services, and historically limited cybersecurity investment.
Local governments hold enormous amounts of sensitive information; tax records, court filings, social services data, utility accounts, law enforcement records, and more. They operate services that communities depend on around the clock: emergency dispatch, water treatment, traffic management, permit processing. And unlike large private-sector organizations or federal agencies, most county and municipal governments have never had the budget, staff, or expertise to build sophisticated cyber defenses.
This combination makes local government an attractive target. Ransomware attackers know that a city paralyzed by a cyberattack faces enormous pressure to pay because the alternative is disrupted public services, irate constituents, and potential safety risks. Many local governments have paid ransoms running into the hundreds of thousands or even millions of dollars.
Federal assessments have confirmed the scope of the vulnerability. When Utah conducted cybersecurity audits across cities, counties, local education agencies, and special districts using federal grant funding, the results were sobering: cybersecurity systems were found to be significantly underdeveloped in many cases, leaving local government entities facing serious, unmitigated risks.
The good news is that awareness is growing and a clear, actionable framework now exists to help any local government, regardless of size or technical sophistication, begin building real defenses.
Enter NIST CSF 2.0: A Framework Built for Everyone
The National Institute of Standards and Technology Cybersecurity Framework is the most widely adopted cybersecurity framework in the United States. It was designed specifically to be accessible to organizations of all sizes and technical maturity levels, including local governments.
At its core, NIST CSF 2.0 organizes cybersecurity activity into six functions. Think of these as the fundamental questions every organization needs to be able to answer:
- Govern — Do we have the policies, roles, and accountability structures to manage cybersecurity as an organizational priority? (New in version 2.0, this function reflects the growing recognition that cybersecurity is fundamentally a governance and leadership challenge, not just a technical one.)
- Identify — Do we know what systems, data, and assets we have, and what our most significant risks are?
- Protect — Have we put appropriate safeguards in place to prevent or limit the impact of a cyberattack?
- Detect — Can we identify when a cyberattack or suspicious activity is occurring?
- Respond — Do we have a plan to contain and manage a cybersecurity incident when one occurs?
- Recover — Can we restore normal operations quickly and effectively after an incident?
Notice that none of these questions require you to be a cybersecurity expert to understand them. That is by design. NIST CSF 2.0 was built to bridge the communication gap between technical staff and organizational leadership. It gives elected officials and administrators a shared vocabulary for discussing cyber risk and a structured way to hold their organizations accountable for addressing it.
The framework does not tell you exactly which software to buy or which specific configurations to implement. Instead, it gives you a structured process to assess where you are today, understand where your gaps lie, and prioritize the actions most likely to reduce your actual risk.
What a CSF Assessment Actually Looks Like
For many local government leaders, the word "assessment" can trigger visions of expensive consultants, months of disruption, and reports that gather dust on a shelf. A NIST CSF assessment, done well, is none of those things.
The process begins with an honest inventory. What systems does your government operate? What data do you hold, and where does it live? Who has access to what, and how is that access managed? Many local governments discover in this stage that they have systems and data they had partially forgotten about. Often that surfaces in the form of legacy software still running on old servers, shared passwords that have never been changed, or vendor accounts that were set up years ago and never reviewed.
From there, the assessment measures current practices against the framework's categories and subcategories. The output is not a pass/fail grade, but a maturity profile which can give you a clear picture of which areas are reasonably well-managed and which represent significant gaps. Critically, this includes a risk prioritization. Not all gaps are equally dangerous, and a good assessment helps you focus resources on the vulnerabilities most likely to result in a serious incident.
For local governments, common gaps often include: lack of multi-factor authentication on critical systems; inadequate endpoint protection (security software on employee computers and devices); absence of regular data backups stored separately from primary systems; limited or no employee security awareness training; and no formal incident response plan.
The assessment also produces something equally valuable: documentation. A formally documented gap analysis, tied to a recognized federal framework, is precisely the evidence that grant programs and oversight bodies look for when evaluating whether an organization is ready to receive and effectively use cybersecurity funding.
What Leadership Needs to Do Now
While applying for and winning grants is an attractive reason, the value of completing a NIST CSF assessment is not contingent on any particular grant program. The work itself has lasting organizational value and it positions your government to pursue any future federal or state cybersecurity funding. It provides leadership with the information they need to make smart budget decisions. And it is the essential first step toward actually building defenses that work.
For elected officials and administrators, the path forward does not require becoming a cybersecurity expert. It requires three things:
- Ask your IT leadership whether a formal NIST CSF assessment has been completed. If the answer is no, make it a priority. If the answer is yes, ask what the top three gaps are and what is being done to address them.
- Treat cybersecurity as a governance issue, not just a technology issue. NIST CSF 2.0's new Govern function is a direct signal that cybersecurity risk belongs on the agenda of every city council and county commission. Accountability starts at the top.
- Don't wait for an incident to create urgency. Every local government that has paid a ransom, or scrambled to restore services after a breach, wishes they had acted earlier. The cost of prevention is a fraction of the cost of response.
Conclusion: The Framework Is the Foundation
Real cybersecurity incidents are happening every day, and if you’re reading this article then you probably are already aware of other local governments who have been targeted. The truth of the matter is that the communities that avoided catastrophe did so because someone made a decision, in advance, to build a foundation.
NIST CSF 2.0 is that foundation. It is not bureaucratic box-checking. It is the most practical tool available for a local government leader to understand their cyber risk, communicate it clearly, prioritize their resources, and access the funding that exists to help.
Greg Marks is a Risk Assurance Manager at Larson & Company. He specializes in cybersecurity, SOC, and IT audits for insurance companies and other industries.
LinkedIn