NIST CSF Maturity Tiers: A Practical Security Guide
What are the four NIST CSF maturity tiers? A plain-language guide to security maturity levels, what each tier means in practice, and how threat modelling helps you climb the curve.
Dave Barton
Co-founder
Security maturity isn’t a pass/fail
When we talk about security maturity, most people think of it as a binary test. Either you’re secure, or you’re not. Either you pass the audit, or you fail. That’s not how it works in practice.
Security maturity is a spectrum. It’s a recognition that every organisation starts somewhere, that improvement happens in stages, and that the destination depends entirely on your risk tolerance and business model. A bootstrapped SaaS company at Tier 2 maturity might be exactly where it needs to be. An enterprise handling healthcare data needs a different target. The framework exists not to judge where you are, but to help you move deliberately in the direction that makes sense for your business.
Most teams are already somewhere on the maturity curve, even if they’ve never formalised it. You’ve probably already documented a deployment process. You’ve probably already identified a few things that could go wrong with your architecture. You’ve probably already created an incident response plan when a security issue landed in your lap. Maturity frameworks just make that implicit progress explicit and repeatable.
What NIST CSF actually is (and isn’t)
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is a voluntary standard created by the US government to help organisations manage security risk. It’s not a mandate unless a contract or regulation requires it. It’s not a checklist you complete and then declare yourself “done.” It’s a structured way of thinking about security that applies across industries, company sizes, and technical architectures.
Think of it like a nutrition framework. A registered dietician doesn’t hand you a single meal plan and say “follow this forever.” Instead, they give you principles: eat whole foods, understand macronutrients, listen to your body’s needs, adjust as you grow. The framework is the same whether you’re an athlete, a parent, or someone recovering from illness. The implementation varies wildly.
NIST CSF 2.0 organises security into six functions. Govern means you have a strategy and you’re making deliberate security decisions aligned to business goals. Identify means you understand what you’re protecting and what the risks are. Protect means you implement controls to reduce those risks. Detect means you can see when something goes wrong. Respond means you know how to act when an incident happens. Recover means you can restore normal operations. None of these are optional in a meaningful sense — every organisation does some version of all six. The maturity question is just how structured and deliberate you are about each one.
The four maturity tiers
NIST CSF uses four tiers to describe how mature an organisation’s security practices are. Understanding these tiers is the key to understanding where you stand today and where you’re trying to get to.
Tier 1: Partial. At this level, security decisions are mostly reactive. You respond to problems as they emerge — a vulnerability scanner finds something, so you patch it. A security incident happens, so you fix whatever caused it. There’s no formal process for asking “what threats exist?” before you build something new. You probably have some security practices in place, but they’re not documented or standardised. Different teams might handle similar security problems in completely different ways. This is where most small startups begin, and there’s nothing wrong with that.
Tier 2: Risk Informed. You’ve started to be deliberate. You understand that security decisions should be based on a picture of your risk landscape, not just immediate problems. You document your processes. You ask questions about what could go wrong before you build new features. You might be thinking about compliance requirements early, rather than discovering them late. You’re starting to integrate security into your development workflow, even if it’s not perfect yet. Many growing startups and mid-market companies operate here.
Tier 3: Repeatable. Your security practices are now standardised and repeatable. You have documented processes that your teams follow consistently. Security reviews happen for major architectural changes. You regularly update your threat models as your system evolves. You track and measure security metrics. You have a formal incident response plan that you’ve actually tested. Most large established companies operate at this level for their core systems.
Tier 4: Adaptive. You don’t just follow processes — you continuously improve them based on emerging threats and lessons learned. You adapt your security posture as new attack methods emerge. You integrate threat intelligence into your decision-making in real time. You’re not just reacting to known risks; you’re anticipating new ones. This is where organisations with advanced security programmes operate, and it’s genuinely difficult to maintain.
Where most teams actually sit
Let’s be honest: most startups and mid-market companies are somewhere between Tier 1 and Tier 2. That’s completely normal. It’s not a failure. It’s where most organisations should be when they’re focused on product-market fit, revenue growth, and just staying afloat.
If you’re a founder who got here by building fast without formal security processes, you’re not behind. You’re just at the beginning of a deliberate improvement phase. If you’re a CTO at a growth-stage company and you’re feeling the gap between what security needs and what your team’s been doing ad hoc, you’re not alone — and you’re right to feel that tension. It’s why we built ThreatKrew — to make professional security practices accessible to teams that can’t afford six-figure consulting engagements.
The mistake most organisations make is thinking they need to leap from Tier 1 to Tier 4 overnight. You don’t. That path burns out security teams and frustrates engineers. Instead, the goal is to understand where you are today, decide where you actually need to be (not where some compliance document says you should be), and take deliberate steps to move in that direction.
Tier 4 isn’t even the right target for every organisation. If you’re running a B2B SaaS product where a data breach is catastrophic for customer trust, you might genuinely need to aim for Tier 3 or higher. If you’re running an internal tool with limited exposure, Tier 2 might be your right target. The maturity framework gives you the language to have that conversation with your team and stakeholders.
How threat modelling moves you up the maturity curve
Here’s the connection that most organisations miss: threat modelling is the most direct path from reactive (Tier 1) to risk-informed (Tier 2) and beyond. It’s not a one-off exercise. It’s the foundation of deliberate security.
When you start a threat modelling practice, you’re directly addressing what each tier requires. Let’s map it to the NIST functions:
Identify. Threat modelling forces you to decompose your architecture and really understand what components you have, how they interact, and what data flows through them. You can’t write a useful threat model without building that mental map. This alone moves you from Tier 1 (reactive) to Tier 2 (risk-informed) because you’ve now asked the foundational question: what are we protecting?
Protect. Once you know what the threats are, you can choose specific controls to mitigate them. This is where frameworks like NIST SP800-53 come in — they give you a standard language for protective measures. Understanding your threats through structured analysis lets you choose controls that actually defend against your specific risks, not just generic best practices.
Govern. Having a threat modelling practice is itself a governance activity. You’re making deliberate security decisions. You’re documenting assumptions. You’re integrating security thinking into your architecture review process. That’s governance.
Detect and Respond. When you understand your threat landscape, you know what to monitor for (Detect) and you have a basis for building incident response plans (Respond).
The challenge with this approach — and where most teams get stuck — is that threat modelling, done properly, requires time and expertise. You need someone who understands your architecture deeply enough to identify threats, who knows attack methodologies like STRIDE, PASTA, or attack trees, and who can translate findings into actionable controls. That’s not easy to do repeatedly, which is exactly the problem.
This is also why automated threat modelling changes the equation. When threat modelling is hard to do, teams skip it or do it once and then let it gather dust. When it’s accessible and repeatable — when you can run it as part of your development process rather than as a special project — it becomes the engine that drives maturity improvement. You start asking “what changed in our architecture?” and generating updated threat models instead of assuming last year’s analysis still applies. That consistency and repeatability is exactly what moves you from Tier 2 to Tier 3.
A practical maturity roadmap
Moving from one tier to the next doesn’t require massive changes. It requires deliberate practice and a few key habits. Here’s what it actually looks like:
From Tier 1 to Tier 2:
- Start asking “what could go wrong?” before you build. Don’t wait for problems to emerge.
- Run a threat model on your core architecture. Use a structured methodology — STRIDE is popular and well-documented. You don’t need to be an expert; the process of asking the questions is what matters.
- Document your key assumptions about how your system works and where you’ve accepted risk.
- Create a simple incident response process. Who gets notified when there’s a security issue? What’s the first thing you do?
- Start tracking security issues and fixes. You don’t need a complex system; a simple spreadsheet is fine. The goal is to see patterns over time.
From Tier 2 to Tier 3:
- Make threat modelling repeatable. Integrate it into your architecture review process. When you’re building something new, threat modelling is part of the design, not an afterthought.
- Update your threat models when your architecture changes materially. Don’t let them rot.
- Document the security controls you’ve chosen and why. Map them to specific threats and to standards like NIST SP800-53 or CIS Controls.
- Test your incident response plan. Run a tabletop exercise. Find out what you missed before an actual incident forces you to learn.
- Measure something. Security metrics are tricky, but even simple counts help: number of security findings in architecture reviews, mean time to patch for critical issues, percentage of architecture changes that included a threat model.
From Tier 3 to Tier 4:
- Establish a process for consuming threat intelligence. What are attackers doing right now? How does that apply to your systems?
- Build feedback loops so that lessons learned from incidents and threat models inform your architecture decisions going forward.
- Regularly review and update your threat models and controls — not just when things change, but proactively.
- Invest in security automation. Detection, response, and even threat modelling can be partially automated.
- Foster a culture where security thinking is normal, not a separate function.
The transition from Tier 2 to Tier 3 is where most growing organisations should focus. It’s where you get the best return on investment. You’re building the habits and processes that scale. You’re not trying to be perfect; you’re trying to be deliberate and consistent.
Starting where you are
You don’t need to be mature to start maturing. The first step is understanding where you are honestly — not where you wish you were, and not where someone else says you should be. Where are your security decisions made? Are they reactive or deliberate? Do you have documented processes that people actually follow, or does every situation feel like a special case? Have you thought systematically about what threats your architecture faces?
Once you know where you are, pick one thing to improve. Not five things. One. It might be running your first threat model. It might be documenting your incident response process. It might be standardising how you handle security findings. Pick something that moves you one tier forward.
Threat modelling is a particularly high-leverage choice because it touches multiple NIST functions at once. It forces you to understand what you’re protecting (Identify). It reveals what controls you need (Protect). It gives you a basis for detection and response strategies. One practice, multiple improvements. That’s the kind of leverage that makes maturity practical and achievable.
The organisations that mature fastest aren’t the ones trying to jump from Tier 1 to Tier 4. They’re the ones that consistently, deliberately, improve one practice at a time. And they usually start with threat modelling.
Learn more about why threat modelling matters for your architecture, or explore how to choose the right methodology for your team. Curious about how automation fits in? Read how we built ThreatKrew’s multi-agent pipeline or see how ThreatKrew works.
Ready to make threat modelling repeatable and start climbing the maturity curve? Explore the automated platform or join the Founders Program and get professional STRIDE analysis in minutes.
Dave Barton
Co-founder
Co-founder of ThreatKrew. Former AWS security specialist with years of experience securing enterprise infrastructure. Passionate about making professional security analysis accessible to every team.