Framework · NIST Privacy Framework 1.1

NIST Privacy Framework — a tool, not a certificate.

The NIST Privacy Framework is a voluntary, risk-based tool for managing privacy risk — published by the US National Institute of Standards and Technology, free to use, and increasingly adopted globally as an analytical layer over privacy programs. Where ISO 27701 is a certifiable management system standard, NIST PF is something different: a structured way to think about, prioritise, and communicate privacy risk. Version 1.1 — released as Initial Public Draft April 2025, finalising late 2025 / early 2026 — adds AI privacy-risk content and aligns with the Cybersecurity Framework 2.0 released in February 2024.

Framework NIST PF 1.1NIST CSWP 40 IPD · April 2025
Status Voluntary toolNo certification regime
Core Functions FiveIdentify-P · Govern-P · Control-P · Communicate-P · Protect-P
Cost FreePublic-domain document
01 — What NIST Privacy Framework actually is

A risk tool. Not a checkbox.

NIST Privacy Framework is sometimes confused with a regulation, sometimes with a certifiable standard like ISO 27701. It is neither. The clearest framing is "structured way to think about privacy risk" — what NIST itself calls a "voluntary tool." For organisations that already understand they need ISO 27701 certification, NIST PF is unlikely to add much. For organisations needing a structured analytical layer to communicate privacy risk to boards, regulators, or vendor due-diligence reviewers, it is one of the most useful tools available — and it is free.

What it IS

A tool for managing privacy risk.

  • Voluntary, risk-based methodologyNIST publishes it as guidance; organisations adopt as much or as little as makes sense for their risk profile.
  • Free and public-domainNo purchase required. Downloadable in full from NIST. Companion materials (mappings, examples) all open access.
  • Structured taxonomy of privacy outcomesFive Functions, eighteen Categories, around one hundred Subcategories — a hierarchy of "what good looks like" for privacy risk management.
  • Aligned with NIST CSF 2.0Designed to operate alongside the Cybersecurity Framework — same Core structure, complementary domains.
  • Useful as an analytical layerParticularly powerful for board reporting, vendor risk frameworks, and communicating privacy maturity to non-specialists.
What it ISN'T

Not a certification. Not a regulation.

  • Not certifiableNo certification body issues a NIST PF certificate. There is no audit regime, no surveillance cycle, no certificate-renewal cadence. You cannot "be ISO 27701-certified equivalent."
  • Not a regulationAdopting NIST PF does not satisfy any specific privacy regulation. GDPR, KSA PDPL, UAE PDPL, DPDP — all assess substantive obligations under their own frameworks, not NIST PF coverage.
  • Not a substitute for ISO 27701If an organisation needs external validation of its privacy program, NIST PF cannot provide it. Vendors, customers and boards seeking certification want ISO 27701.
  • Not a control catalogue like ISO 27002NIST PF describes privacy outcomes; it does not prescribe specific controls or implementation methods. Operational granularity comes from cross-mapping to other frameworks.
  • Not a substitute for legal analysisPrivacy regulations have substantive requirements that no framework can fully encode. NIST PF is a complement to regulatory analysis, not a replacement.
02 — The three components

Core, Profiles, Tiers.

The framework is built on three components that work together. The Core is the catalogue of privacy outcomes; Profiles are how an organisation selects from the Core to match its specific situation; Tiers describe the maturity of how those Profiles are operated in practice. Together they let an organisation say not just "we manage privacy risk" but "here's our specific risk profile, here's the maturity at which we operate, here's the gap to where we want to be."

Component 01

Core

The catalogue of privacy outcomes

A hierarchical taxonomy of privacy activities and outcomes — five Functions broken into Categories and Subcategories. The Core is the universal reference that every Profile selects from. Same structure across all NIST frameworks, designed to make outcomes communicable across security, privacy and AI risk teams.

Contains
  • Five Functions (Identify-P, Govern-P, Control-P, Communicate-P, Protect-P)
  • Eighteen Categories nested under Functions
  • Roughly one hundred Subcategories of granular outcomes
  • Informative References to other standards
Component 02

Profiles

Customised selections from the Core

A Profile is an organisation-specific selection of Core outcomes — choosing which Categories and Subcategories matter most given the organisation's privacy obligations, business priorities and risk appetite. Two Profiles can differ entirely. Most organisations create both a Current Profile (where they are today) and a Target Profile (where they want to be).

Contains
  • Current Profile — present-state assessment
  • Target Profile — desired future state
  • Gap analysis between Current and Target
  • Action plan to close priority gaps
Component 03

Implementation Tiers

How rigorously Profiles are operated

Tiers describe the rigour and integration of an organisation's privacy risk management — Tier 1 (Partial) through Tier 4 (Adaptive). Tiers are not ratings or maturity scores in the conventional sense; they describe how privacy risk management is operated, not how good the controls are individually.

Tier progression
  • Tier 1 — Partial · Ad-hoc, reactive privacy risk management
  • Tier 2 — Risk Informed · Documented but not organisation-wide
  • Tier 3 — Repeatable · Formalised, organisation-wide approach
  • Tier 4 — Adaptive · Continuously improving, strategic
03 — The five Functions

Identify, Govern, Control, Communicate, Protect.

The Functions are the highest level of the Core. The "-P" suffix flags them as Privacy Framework Functions — distinguishing them from CSF Functions of similar names. Three Functions (Identify-P, Govern-P, Protect-P) overlap conceptually with CSF; two (Control-P, Communicate-P) are privacy-specific. Together they cover the privacy risk lifecycle from understanding to ongoing communication.

Function 01 ID-P
Identify-P Understand the context

Develop the organisational understanding to manage privacy risk. Inventory and mapping of data; understanding of privacy interests of individuals; risk assessment methodology. The starting work — and the work most often done loosely.

Function 02 GV-P
Govern-P Set the direction

Develop and implement organisational governance to manage privacy risk. Policies, processes, procedures; risk management strategy; awareness and training; monitoring and review. Reframed and expanded in version 1.1 to align with CSF 2.0's Govern Function.

Function 03 CT-P
Control-P Enable management of data

Develop and implement appropriate activities to enable organisations or individuals to manage data with sufficient granularity. Data processing policies, processes, procedures; data processing management. Where the operational privacy controls live — purpose limitation, data minimisation, access controls.

Function 04 CM-P
Communicate-P Be transparent about data

Develop and implement appropriate activities to enable organisations and individuals to have a reliable understanding of how data is processed. Communication policies, processes, procedures; data processing awareness. Privacy notices, transparency reports, individual rights mechanisms.

Function 05 PR-P
Protect-P Safeguard against breaches

Develop and implement appropriate data processing safeguards. Data protection policies, processes, procedures; identity management; access control; data security. Specifically focused on managing risks associated with cybersecurity-related privacy events. The bridge to CSF 2.0.

04 — Implementation Tiers

From partial to adaptive.

Implementation Tiers describe how an organisation's privacy risk management is operated — not how good the underlying controls are. A Tier 4 organisation with weak controls is still risky; a Tier 1 organisation with strong individual controls is still under-managed. The Tiers measure the rigour and integration of the management approach. Most organisations land at Tier 2 or 3 in early assessments; reaching Tier 4 requires substantial investment in continuous improvement infrastructure.

Tier 01
1

Partial

Privacy risk management is ad-hoc and reactive. Limited awareness of privacy risk at the organisational level. Privacy activities not consistently informed by organisational risk objectives or external requirements.

Tier 02
2

Risk Informed

Risk management practices approved by management but not established as organisation-wide policy. Privacy activities informed by organisational risk objectives, threat environment, business requirements. Information sharing on informal basis.

Tier 03
3

Repeatable

Privacy risk management practices formally approved as organisation-wide policy. Privacy activities regularly updated based on changes in risk objectives, threat environment, business requirements. Consistent methodology applied across the organisation.

Tier 04
4

Adaptive

Privacy risk management practices adapt based on lessons learned and predictive indicators. Continuous improvement embedded culturally. Real-time integration of privacy risk into broader enterprise risk management. The aspirational state — uncommon in practice.

Tiers are not goals — they are observations. An organisation does not "achieve" Tier 3; it operates at Tier 3. Most organisations target Tier 3 as the practical operating state — Tier 4 is rare in practice and requires substantial investment in continuous improvement infrastructure that often outweighs the marginal benefit. Tier honesty is more important than Tier ambition: Tier 2 with accurate self-assessment is more useful than Tier 3 with inflated claims.

05 — AI privacy risk in v1.1

The most material new content in version 1.1.

Version 1.0 of the Privacy Framework — published in January 2020 — predated the explosion of generative AI. Version 1.1 explicitly addresses AI privacy risks for the first time. New Section 1.2.2 catalogues how AI tools relate to privacy risks, with particular attention to attack patterns that have emerged in the last five years. For organisations deploying AI systems that touch personal data, this is the single most useful piece of guidance the framework now provides.

NIST PF 1.1 · Section 1.2.2

AI privacy risks the framework now names.

Four distinct AI privacy-risk patterns the v1.1 update addresses explicitly. Each represents a way AI systems can compromise privacy that the 2020 v1.0 was silent on.

Membership inference

Attacks that determine whether a specific individual's data was in an AI model's training set — even when the model is supposedly anonymised. Privacy risk for any data subject whose records were used in training.

Data reconstruction

Attacks that reconstruct sensitive training data from a model's behaviour. Particularly concerning for models trained on personal data — health records, financial information, identity documents. Reconstruction can recover specific individuals' records.

Prompt injection

Manipulation of AI system inputs to extract personal data the system holds in context. A particular concern for chatbots and assistants with access to user-specific data — adversarial prompts that bypass intended controls.

Algorithmic bias affecting individuals

Systemic, computational, statistical and human biases that cause AI systems to make important decisions and predictions about individuals in ways that disadvantage protected groups. Privacy risk in the form of inappropriate inferences from data.

For organisations with AI systems that process personal data, the v1.1 update is genuinely useful. The NIST PF integration is naturally complemented by ISO 42001 (AI management system, published December 2023) and the NIST AI Risk Management Framework. The combined toolkit — NIST PF for privacy risk, NIST AI RMF for AI risk, ISO 42001 for AI management system — gives organisations a structured way to navigate the overlap between privacy and AI governance.

06 — When to use NIST PF vs ISO 27701

Different tools for different problems.

The most common practitioner question we hear about NIST PF is whether to use it instead of, or alongside, ISO 27701. The honest answer: they solve different problems. ISO 27701 provides certifiable external assurance; NIST PF provides structured analytical depth. Many of the strongest privacy programs use both — ISO 27701 as the certified backbone, NIST PF as the analytical layer for board reporting and AI governance work.

Situation Likely right tool
Customers / vendors require external privacy assurance Vendor due diligence asking "are you ISO 27701 certified" — a yes-or-no question with a yes-or-no answer. ISO 27701
Only ISO 27701 carries certified external assurance. NIST PF cannot satisfy this requirement.
Board needs structured privacy-risk reporting Quarterly board reporting on privacy posture, gap analysis, target-state articulation, prioritisation rationale. NIST PF
Profile / Tier structure communicates clearly to non-specialist boards. ISO 27701 documentation often too granular for this purpose.
AI system handling personal data needs privacy governance ML model training on customer data; chatbot with access to user records; algorithmic decisions about individuals. NIST PF
v1.1 explicit AI privacy-risk content; Profile structure ideal for AI-specific privacy posture. ISO 27701 less specific on AI.
Regulator-facing evidence of structured privacy program Demonstrating accountability to GDPR / KSA PDPL / UAE PDPL / DPDP regulators in inspection or investigation. ISO 27701
Certified ISMS / PIMS more widely recognised by international regulators. NIST PF accepted but less universally.
No budget for ISO certification Early-stage company; pre-commercial; budget constraints making ISO 27701 certification not yet justifiable. NIST PF
Free to adopt. Build the structure first; pursue ISO 27701 certification once justified by customer / vendor demand.
Mature multinational with both internal and external assurance needs Large enterprise; multiple jurisdictions; certified privacy posture plus sophisticated internal risk management infrastructure. Both
ISO 27701 as certified backbone for external assurance; NIST PF as analytical layer for internal risk management. Common pattern in mature programs.
Heavy NIST CSF 2.0 / cybersecurity orientation Existing CSF 2.0 program; security and privacy teams want a unified framework family. NIST PF
v1.1 explicitly aligned with CSF 2.0 — same Core structure, complementary domains. Reduces friction for organisations on the NIST family.
Sales channel into US Federal / FedRAMP-adjacent markets Selling to US Federal agencies, contractors, or organisations operating under federal frameworks. Both
NIST PF expected by US Federal procurement; ISO 27701 expected by international parts of the same procurement landscape. Both required in mature programs.

For most organisations in our practice, the answer is "ISO 27701 with NIST PF as analytical overlay." The certification carries the external assurance weight; the framework provides the analytical depth for board reporting, AI governance, and internal continuous improvement. Read the ISO 27701 page for the certification side; this page is the working brief for the NIST PF analytical side.

07 — What the work looks like

Eleven workstreams NIST PF actually triggers.

NIST PF work is shaped by the framework's three components — Core, Profiles, Tiers. The workstreams below cover building Current and Target Profiles, conducting gap analysis, integrating with adjacent NIST frameworks (CSF 2.0, AI RMF), and operationalising the analytical outputs as a working privacy risk management capability. Most engagements run shorter than ISO 27701 certification builds — the absence of certification audit shortens the back end materially.

W-01

Scope & risk context

Definition of organisational and business context for NIST PF adoption. Identification of privacy risks in scope, key stakeholders, regulatory landscape. The Identify-P starting work.

W-02

Data inventory & mapping

Comprehensive data processing inventory aligned to ID-P Categories. Data flows, processing purposes, data subjects, recipients, retention. The substantive precondition for any meaningful Profile work.

W-03

Current Profile development

Assessment of current state against the Core. Subcategory-level current achievement scoring. Honest baseline that becomes the starting point for gap analysis. Tier self-assessment overlay.

W-04

Target Profile development

Articulation of desired future state. Selection of priority Subcategories given organisational risk profile, regulatory obligations, business priorities. Target Tier selection. The aspiration document.

W-05

Gap analysis & prioritisation

Structured comparison of Current and Target Profiles. Gap inventory by Function and Category. Risk-based prioritisation of gaps for closure. The analytical centrepiece — and the artefact most useful for board reporting.

W-06

Action planning

Initiative roadmap to close priority gaps. Resource estimation, sequencing, ownership assignment. Quarterly progress milestones. The bridge from analysis to operational change.

W-07

CSF 2.0 integration

Where the organisation runs CSF 2.0 alongside NIST PF, integration of the two Profiles. Shared Govern Function, complementary control selections, single integrated risk register. The analytical efficiency of running both as intended.

W-08

AI privacy risk overlay

Application of v1.1 AI privacy risk content. Inventory of AI systems processing personal data. Membership inference, data reconstruction, prompt injection, algorithmic bias risk assessment. Coordination with NIST AI RMF and ISO 42001 if applicable.

W-09

Mapping to regulations

Cross-walk of NIST PF Subcategories to GDPR, KSA PDPL, UAE PDPL, DPDP obligations. Where PF outcomes map cleanly to regulatory requirements; where regulation requires more than the framework specifies. The compliance integration layer.

W-10

Mapping to ISO 27701

For organisations running both, alignment of NIST PF Profile to ISO 27701 controls. Where PF analytical outputs feed ISO 27701 Statement of Applicability decisions; where the two frameworks diverge. Single integrated operating model.

W-11

Board & vendor reporting

Translation of Profile / Tier outputs into board-grade reporting. Vendor risk framework templates using NIST PF as the analytical layer. Quarterly progress narratives. Where the framework's analytical investment pays back.

08 — How this is delivered

Three engagement shapes.

NIST PF work is delivered through one of three engagement shapes — typically lighter than ISO 27701 / 27001 certification builds because there is no certification audit at the end. Most engagements focus on building Current and Target Profiles, gap analysis, and operationalising the analytical outputs. Many run alongside or after an ISO 27701 build to add analytical depth.

09 — Common questions

Things people ask on first call.

Common questions on NIST Privacy Framework — particularly from organisations evaluating whether to adopt it, organisations with existing ISO 27701 work asking how the two relate, and organisations needing to understand the v1.1 AI privacy content.

Is NIST PF v1.1 actually finalised?
As of early 2026 — finalising. The v1.1 Initial Public Draft was released 14 April 2025; the public comment period closed 13 June 2025; NIST anticipated final publication in Q4 2025 / early 2026. The substantive content is stable — the Core, Functions, Categories, Subcategories, AI privacy risk content, and CSF 2.0 alignment are unlikely to change materially in finalisation. Practitioners can build to the IPD with confidence; final version typically only sharpens language and adds informative references rather than changing structure.
Can NIST PF replace ISO 27701?
No — they solve different problems. NIST PF provides structured analytical depth for managing privacy risk; ISO 27701 provides certifiable external assurance. Where vendor / customer / regulator requirements ask "are you ISO 27701 certified," NIST PF cannot satisfy that requirement — there is no NIST PF certification regime. Where the requirement is "demonstrate structured privacy risk management," NIST PF can satisfy it (and at zero cost). Most mature programs use both — ISO 27701 as the certified backbone, NIST PF as the analytical layer.
Is NIST PF adoption visible to customers / vendors?
Less so than ISO 27701, but increasingly yes. NIST PF adoption is communicated through self-attestation — there is no certificate to point to. Mature vendor risk frameworks (particularly in US enterprise procurement) increasingly ask about NIST PF Tier and Profile coverage as supplementary questions to the headline ISO 27701 certification check. For US-Federal-adjacent procurement, NIST PF is increasingly expected. For international procurement, ISO 27701 remains the more universal signal.
How does NIST PF integrate with CSF 2.0?
Tightly, by design. NIST CSF 2.0 (Cybersecurity Framework, released February 2024) and NIST PF 1.1 share the same Core structure — Functions, Categories, Subcategories. They share the Govern Function explicitly. They are designed to be used together: CSF for cybersecurity risk, PF for privacy risk, with overlap on shared concerns like data security and incident response. Organisations on CSF 2.0 add PF 1.1 with low marginal effort; the analytical pattern is already familiar. This is the strongest argument for NIST PF over ISO 27701 — for organisations already on CSF 2.0, NIST PF is the natural privacy companion.
What's the practical effect of the v1.1 AI privacy content?
For organisations with AI systems processing personal data — substantial. The v1.1 AI privacy content names four specific risk patterns (membership inference, data reconstruction, prompt injection, algorithmic bias) and provides analytical structure for assessing and managing them. For organisations without AI systems — modest; the content is informational. The stronger combined toolkit for AI privacy work is NIST PF 1.1 + NIST AI RMF + ISO 42001 — together providing analytical layer, AI risk methodology, and certifiable management system respectively.
Should we self-assess our Tier or get external assessment?
Self-assessment first; external if value justifies. The framework is designed for self-assessment — Tier descriptions are clear enough that an honest internal assessment usually arrives at the right answer. External assessment adds value where the organisation needs board-grade attestation, has weak internal capability, or wants benchmark comparisons against peers. For most early-stage NIST PF adopters, self-assessment is the right starting point; external assessment becomes valuable once the program is mature enough to benefit from the comparison and credibility benefits.
How long does NIST PF adoption take?
Typically faster than ISO 27701 certification because there is no certification audit at the end. Profile-only engagements (Current Profile + Target Profile + gap analysis + roadmap) typically run 6 — 10 weeks. Full implementation engagements that include action-plan execution and operating capability build typically run 14 — 24 weeks. Compare to ISO 27701 certification builds at 9 — 14 months. Faster timeline reflects the framework's analytical-tool nature; the trade-off is the absence of external certified assurance at the end.
Is NIST PF used outside the US?
Increasingly, yes — though US-adoption remains the dominant pattern. Organisations in Europe, GCC, Asia-Pacific use NIST PF as an analytical layer where they need a structured tool that doesn't carry the cost or audit overhead of ISO certification. Particularly common in mature enterprise risk teams looking for board-grade reporting frameworks. The CSF 2.0 alignment has strengthened this — organisations adopting CSF 2.0 (which has wide international adoption) frequently add NIST PF 1.1 as the natural privacy companion. Not yet at ISO 27701's level of international recognition, but the gap has narrowed materially since 2020.

A tool, used well.

NIST Privacy Framework's value comes from how it is used, not how much it costs. The framework is free; the analytical investment to build a meaningful Profile and operate it as a working risk-management capability is real. A 30-minute scoping call costs nothing — we will tell you honestly whether NIST PF makes sense for your situation, how it fits with any existing ISO 27701 work, and what the right shape of engagement looks like.

Schedule a call