Blog

Mapping NIST CSF to Your Cisco Meraki Network

A practical guide to aligning the five NIST Cybersecurity Framework functions with the configuration data already available in your Meraki Dashboard API.

February 2026 · 9 min read

Why NIST CSF Matters for Network Teams

The NIST Cybersecurity Framework was originally developed for US federal agencies and critical infrastructure operators. That was 2014. A decade later, NIST CSF has become the de facto cybersecurity risk management framework adopted by organisations worldwide — regardless of whether they have any obligation to a US government agency.

The reason is straightforward: boards and executive teams understand it. The five core functions — Identify, Protect, Detect, Respond, Recover — provide a language for cybersecurity posture that translates across technical and non-technical audiences. When a CISO presents a scorecard organised by these five functions, the board does not need a networking background to understand where the organisation is strong and where it is exposed.

NIST CSF also maps cleanly to other frameworks your organisation may already be working with. ISO 27001 control objectives align with NIST CSF subcategories. SOC 2 trust service criteria overlay onto the same structure. If you are pursuing multiple certifications or responding to customer security questionnaires, NIST CSF acts as the connective tissue between them all.

For network teams managing Cisco Meraki infrastructure, this creates a specific challenge: how do you demonstrate that your network configuration — the firewall rules, SSID settings, firmware versions, and access controls you manage every day — actually maps to these abstract framework functions? The answer lies in the Meraki Dashboard API and a systematic approach to mapping subcategories to configuration data.

The Five Core Functions and Your Meraki Network

NIST CSF organises cybersecurity activities into five concurrent and continuous functions. Each one has a direct relationship with specific Meraki configuration areas. Here is how they map.

Identify

The Identify function is about understanding your environment. You cannot protect what you do not know exists. This covers asset management, business environment awareness, governance, risk assessment, and risk management strategy.

For Meraki networks, Identify starts with the device inventory API. Every MX appliance, MR access point, MS switch, MV camera, and MG cellular gateway in your organisation is catalogued in the Meraki dashboard with its model, serial number, firmware version, network assignment, and online status. The network topology endpoints expose how these devices connect, which VLANs they serve, and what subnets they manage.

This is the foundation everything else builds on. If your asset inventory in Meraki does not match your actual deployed hardware, every subsequent compliance assessment is built on incomplete data. Automated scanning catches this — offline devices, unclaimed hardware, networks with no devices assigned.

Protect

The Protect function covers the safeguards you put in place to limit the impact of a cybersecurity event. This is where most of your Meraki configuration lives: access control, data security, information protection processes, maintenance, and protective technology.

On a Meraki network, Protect maps to a broad set of configuration areas:

Protect is typically the strongest function for Meraki-managed networks because it maps directly to the configuration settings that network engineers interact with daily. The gap is usually not that the settings are wrong — it is that nobody has systematically verified them against a framework.

Detect

The Detect function covers the activities needed to identify cybersecurity events in a timely manner. This includes anomaly detection, continuous security monitoring, and detection processes.

Meraki provides several detection capabilities through the MX security appliance:

Detect is where many Meraki deployments fall short. The capabilities exist in the product, but they are not always enabled. A Meraki MX with an Advanced Security licence has IDS/IPS and AMP available, but if nobody turned them on during deployment, the Detect function has a gap.

Respond

The Respond function covers what happens when a cybersecurity event is detected. This includes response planning, communications, analysis, mitigation, and improvements to the response process.

Meraki's contribution to the Respond function is primarily about visibility and configuration:

Respond is not something a network configuration tool can fully satisfy — it requires documented processes, communication plans, and human decision-making. But the network infrastructure needs to provide the telemetry and alerting that makes those processes effective.

Recover

The Recover function focuses on restoring capabilities or services that were impaired during a cybersecurity event. This includes recovery planning, improvements, and communications.

For Meraki networks, Recover maps to:

Recover is the function most organisations handle least well. Everyone focuses on building walls (Protect) and watching for intruders (Detect), but few teams have a documented, tested recovery process for their network infrastructure.

Mapping Table: NIST CSF Subcategories to Meraki API

The five functions break down into categories and subcategories. Here are ten key subcategories with direct Meraki API mappings and what to check for compliance.

Subcategory Description Meraki API Endpoint What to Check
ID.AM-1 Physical devices and systems are inventoried GET /organizations/{id}/devices All devices claimed, online, assigned to networks
PR.AC-1 Identities and credentials are issued, managed, and verified GET /organizations/{id}/admins Named accounts, no generic/shared emails, appropriate privilege levels
PR.AC-7 Users, devices, and assets are authenticated GET /organizations/{id}/loginSecurity MFA enforced org-wide, password policy configured
PR.DS-2 Data in transit is protected GET /networks/{id}/wireless/ssids WPA2-Enterprise or WPA3 on all production SSIDs, no open networks
PR.IP-12 A vulnerability management plan is developed and implemented GET /organizations/{id}/firmware/upgrades Firmware current, no devices running end-of-life versions
PR.MA-1 Maintenance and repair of assets is performed and logged GET /organizations/{id}/configurationChanges Change log active, modifications attributed to named admins
DE.CM-1 The network is monitored to detect potential cybersecurity events GET /networks/{id}/appliance/security/intrusion IDS/IPS enabled in detection or prevention mode
DE.CM-8 Vulnerability scans are performed GET /networks/{id}/appliance/security/malware AMP enabled, content filtering configured
RS.CO-1 Personnel know their roles and order of operations when a response is needed GET /networks/{id}/alerts/settings Alert recipients configured, security alerts enabled, notification channels active
RC.RP-1 Recovery plan is executed during or after a cybersecurity incident GET /organizations/{id}/devices/statuses Device statuses documented, configuration baseline captured, restoration procedure defined

This is not an exhaustive mapping — NIST CSF contains over 100 subcategories, and many of them relate to organisational processes rather than technical controls. But these ten represent the subcategories where Meraki network configuration provides direct, auditable evidence.

Common Gaps in Meraki NIST Alignment

After analysing hundreds of Meraki configurations, patterns emerge. The same gaps appear repeatedly, and they cluster around two of the five functions.

Detect is consistently the weakest function. The most common finding is that IDS/IPS is available but not enabled. Organisations purchase the Advanced Security licence for content filtering but never configure the intrusion detection features. Syslog forwarding is another frequent gap — without it, security events exist only in the Meraki dashboard's 30-day rolling log with no long-term retention or external correlation.

Recover is the most neglected function. Very few organisations have a documented network recovery process. They trust that Meraki's cloud management means the configuration is always available, which is true — but they have never tested whether they can rebuild their network from that configuration data. When the question is "how quickly can you restore your network to a known-good state after a compromise?", silence is the most common answer.

Within the Protect function, the specific gaps tend to be:

Continuous Monitoring vs Point-in-Time Assessment

One of the most important things to understand about NIST CSF is that it was designed as a living framework, not a point-in-time certification. Unlike Cyber Essentials, which has an annual assessment date, NIST CSF describes an ongoing posture that should be continuously measured and improved.

This distinction matters for how you approach compliance. A point-in-time assessment tells you where you stood on a specific date. Continuous monitoring tells you where you stand right now — and alerts you when something changes.

For Meraki networks, configuration drift is the primary risk between assessments. A firewall rule is added to troubleshoot a connectivity issue and never removed. An admin account is created for a contractor who left three months ago. A new SSID is deployed for an event and forgotten. Each of these changes individually might be minor, but cumulatively they degrade your NIST CSF posture without anyone noticing.

Quarterly reviews should be the minimum cadence. Monthly is better. Automated scanning enables continuous posture assessment — run a scan after every change window, or schedule them weekly, and compare scores over time. The trend matters as much as the absolute number.

The organisations that score highest against NIST CSF are not the ones with the most expensive security tools. They are the ones with consistent visibility into their own configuration and a process for acting on what they find.

How MerakiGuard Maps to NIST CSF

We built MerakiGuard to address exactly this challenge. Rather than manually cross-referencing Meraki configuration pages against framework subcategories, MerakiGuard connects to your Meraki organisation via a read-only API key and automatically evaluates your configuration against compliance standards — including NIST CSF.

MerakiGuard checks span all five NIST CSF functions:

Each function receives its own score, so you can see at a glance where your Meraki network is strong and where it needs attention. The per-check results include the specific configuration values found, what the framework expects, and actionable remediation guidance for every failure.

NIST CSF is one of four compliance standards MerakiGuard supports, alongside Cyber Essentials+, PCI-DSS, and CIS Benchmarks. If your organisation reports against multiple frameworks, a single scan produces scores against all of them — because the underlying Meraki configuration data is the same, only the compliance lens changes.

No agents. No firewall changes. No write access to your network. Connect a read-only API key, run a scan, and see exactly how your Meraki infrastructure maps to NIST CSF.

See how your Meraki network maps to NIST CSF.

Connect your Meraki dashboard, run a compliance scan, and get a per-function NIST CSF scorecard in minutes. Free to start, no credit card required.

Start Free Today