Blog
12 min read

NIST CSF 2.0 evidence for DFPI: Govern, Identify, and Protect done honestly

DFPI maps cyber evaluations to NIST CSF 2.0. The hard part is proving Govern, Identify, and Protect outcomes with dated artifacts—not framework posters. Here is how operators build evidence chains reviewers trust.

Written by

CompliFi Editorial · Editorial

Our team has experience across compliance operations, licensing readiness, and digital-asset program work — including themes that show up in California DFAL, federal BSA/MSB expectations, and global licensing conversations. These articles distill public regulatory materials and operator practice into field notes for your internal workflows. Educational only — not legal advice; confirm specifics with counsel.

  • Topics: DFAL / DFPI, NMLS & MU bundles, AML, cyber, custody, consumer programs
  • Sources: regulator hubs, statute references, and industry-standard frameworks

Meet the editorial team · Editorial standards

Compliance workflow: licensing, evidence vault, and ongoing programsLicensingStatutory rows & ownersEvidence vaultArtifacts & versionsProgramsAML · cyber · custody
Illustration: how operators connect licensing tasks, evidence, and ongoing supervision modules.

Framework language as your cross-team contract

Applicants and licensees must describe cybersecurity programs with enough specificity that DFPI can assess maturity. Published materials reference evaluating programs using NIST CSF 2.0 functions—especially Govern, Identify, and Protect as the foundation for everything downstream in Detect, Respond, and Recover.

Security engineers live in tickets; executives live in risk committees. CSF categories give both sides a shared map. Start by inventorying systems, data classes, and critical processes, then attach controls and owners to each before you write marketing copy about “bank-grade security.”

Educational only—not legal advice. Confirm current DFPI guidance at https://dfpi.ca.gov/regulated-industries/digital-financial-assets/ and align attestations with counsel.

Govern: strategy, policy, and accountability you can audit

Govern outcomes include organizational context, risk management strategy, roles, and supply chain risk governance. For VA businesses, that means board or committee oversight of cyber risk, approved information security policies with version history, and vendor risk programs that go beyond collecting SOC reports without reading them.

Document who approves exceptions—temporary MFA gaps, emergency access, or new vendor onboarding—and for how long. Perpetual exceptions are policy failures with timestamps.

Align cyber governance minutes with AML committee themes where incidents overlap: fraud spikes, wallet drains, and third-party failures often touch both.

Identify: asset inventory and risk assessment that match production

Identify functions require understanding what you run: wallets, APIs, admin consoles, CI/CD pipelines, custody nodes, and customer data stores. Automated discovery helps, but human attestation still matters—engineers should sign quarterly that inventories reflect reality.

Risk assessments should reference actual threats: credential stuffing, API key leakage, insider abuse, and smart-contract dependencies—not generic “cybercrime” paragraphs. Link findings to remediation tickets with due dates.

When you launch new chains or custody models, update the Identify baseline the same sprint. Late updates are how examiners find shadow systems.

Protect: access, encryption, and secure development evidence

Protect outcomes cover identity management, protective technology, awareness training, and secure configuration. Show MFA enforcement metrics for administrative consoles, not only policy language. Show encryption standards for data at rest and in transit with implementation samples.

Secure software development lifecycle evidence matters for firms shipping wallet apps and smart-contract interfaces: code review records, dependency scanning, and change management for hotfixes.

Train employees on phishing and social engineering with completion logs stored in your vault. Measure click rates on simulations and track improvement.

Mapping artifacts to CSF categories without checkbox theater

Build a simple matrix: CSF category, control description, evidence artifact, owner, last test date. Update it when controls change. Examiners use matrices to request samples; if your matrix is empty, the interview lengthens.

Prefer operational samples over policy PDFs alone: access review tickets, vulnerability scan results with remediation, and change records for firewall rules.

When you cannot yet meet a category, document compensating controls and residual risk accepted by leadership with dates—honesty ages better than surprise.

Third-party risk and custody-specific Protect controls

DFPI materials highlight third-party risk management and custody safeguards—multi-signature policies, key ceremonies, hardware security modules, and monitoring. Contracts should entitle you to evidence, not only promises.

For blockchain platforms, document node security, signing ceremonies, and governance of protocol upgrades your product depends on. Technical design choices should appear in risk acceptance memos.

Reassess vendors after material incidents in their fleet—even if your contract says you were not affected.

Bridging to Detect, Respond, and Recover without stopping at Protect

Govern–Identify–Protect set the foundation, but reviewers will ask how you detect anomalies and rehearse response. Cross-link artifacts: the same asset inventory should feed detection rules; the same incident runbooks should reference critical assets identified in risk assessments.

Do not silo CSF functions into separate binders that contradict each other. One narrative, many appendices.

Quarterly leadership readouts should include open cyber findings by CSF function so funding decisions are visible.

Penetration testing and vulnerability management as Identify/Protect proof

Schedule penetration tests and vulnerability scans on rhythms tied to release velocity—not only annually if you ship weekly. Store findings with severity, owner, and remediation dates; retest critical items before closing tickets.

Examiners compare pen test reports to actual control changes. A critical finding on admin API authentication should map to a merged pull request or architecture decision record, not a vague “in progress.”

Include social engineering tests where appropriate, especially for firms with large support teams handling account recovery.

Executive and board reporting that avoids jargon traps

Translate CSF categories into business outcomes for board readouts: percent of critical systems under MFA, mean time to patch critical vulnerabilities, and count of open high findings past due.

When leadership asks to defer cyber spend, document risk acceptance with dates and triggers for revisit—same discipline as AML residual risk.

Invite the BSA officer to cyber readouts when incidents involve fraud or customer asset loss; siloed briefings create conflicting external narratives.

Detect and Recover: why Govern–Identify–Protect are not enough alone

Even when this article focuses on foundational functions, DFPI will still ask about detection and recovery. Cross-link your CSF matrix so Detect controls reference assets identified in inventory, and Recover playbooks reference critical systems tagged in Protect.

Run joint exercises that start with ransomware detection and end with customer notification drafts—proving functions connect.

Store exercise artifacts beside pen test results so examiners see a continuous program, not isolated projects.

Application versus ongoing supervision evidence

At application, emphasize representative artifacts and clear ownership. After licensing, emphasize trends: fewer overdue findings, faster patch cycles, improved MFA coverage.

When staff turnover, the vault prevents new CISOs from reinventing narratives from scratch.

Cloud, keys, and shared responsibility clarity

For cloud-hosted wallets and APIs, document shared responsibility splits in your risk assessment—what the hyperscaler attests versus what you must prove about configuration, logging, and key custody.

Customer-managed keys and institutional omnibus models need distinct Protect control descriptions; do not copy-paste the same paragraph across products.

Review IAM roles monthly for stale admin accounts tied to departed engineers; orphaned credentials are a common Identify finding.

Pair every major product launch with a lightweight security impact memo stored in the vault—future you will thank present you during DFPI interviews.

CompliFi, DFPI readiness, and the waitlist

Teams lose weeks before examinations reconstructing cyber evidence scattered across Jira, Google Drive, and vendor portals. CompliFi is built to keep DFAL statutory mapping, vault hygiene, and CSF-aligned artifacts in one operating layer security and compliance leads can both navigate.

If you are mapping NIST CSF 2.0 to DFPI expectations for a July 2026 licensing horizon—or stabilizing post-licensing supervision—join the CompliFi waitlist for early access to workflows that keep Govern, Identify, and Protect evidence as living records, not a one-time application upload.

California’s bar is rising; your evidence discipline should rise with it—before DFPI asks for the sample you wish you had filed six months ago.

Related guides

Continue reading — frameworks, tools, and field notes connected to this topic.