instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is GV.PO? (Policy)
Organizational cybersecurity policy is established, communicated, and enforced
Summarize the scope of GV.PO.
Organizational cybersecurity policy is established, communicated, and enforced
What does GV.PO cover?
Organizational cybersecurity policy is established, communicated, and enforced
What is GV.PO-01?
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
Explain the requirement of GV.PO-01.
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
What outcome is expected by GV.PO-01?
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.PO-01.049? (Ex1)
Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction
Explain GV.PO-01.049.
Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction
What is GV.PO-01.050? (Ex2)
Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy
Explain GV.PO-01.050.
Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy
What is GV.PO-01.051? (Ex3)
Require approval from senior management on policy
Explain GV.PO-01.051.
Require approval from senior management on policy
What is GV.PO-01.052? (Ex4)
Communicate cybersecurity risk management policy and supporting processes and procedures across the organization
Explain GV.PO-01.052.
Communicate cybersecurity risk management policy and supporting processes and procedures across the organization
What is GV.PO-01.053? (Ex5)
Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated
Explain GV.PO-01.053.
Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated
What is GV.PO-02?
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
Explain the requirement of GV.PO-02.
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
What outcome is expected by GV.PO-02?
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.PO-02.054? (Ex1)
Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level
Explain GV.PO-02.054.
Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level
What is GV.PO-02.055? (Ex2)
Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates
Explain GV.PO-02.055.
Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates
What is GV.PO-02.056? (Ex3)
Update policy to reflect changes in legal and regulatory requirements
Explain GV.PO-02.056.
Update policy to reflect changes in legal and regulatory requirements
What is GV.PO-02.057? (Ex4)
Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)
Explain GV.PO-02.057.
Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)
What is GV.OV? (Oversight)
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
Summarize the scope of GV.OV.
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
What does GV.OV cover?
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
What is GV.OV-01?
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
Explain the requirement of GV.OV-01.
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
What outcome is expected by GV.OV-01?
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.OV-01.058? (Ex1)
Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives
Explain GV.OV-01.058.
Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives
What is GV.OV-01.059? (Ex2)
Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted
Explain GV.OV-01.059.
Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted
What is GV.OV-02?
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Explain the requirement of GV.OV-02.
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
What outcome is expected by GV.OV-02?
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.OV-02.060? (Ex1)
Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements
Explain GV.OV-02.060.
Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements
What is GV.OV-02.061? (Ex2)
Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary
Explain GV.OV-02.061.
Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary
What is GV.OV-02.062? (Ex3)
Review strategy in light of cybersecurity incidents
Explain GV.OV-02.062.
Review strategy in light of cybersecurity incidents
What is GV.OV-03?
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
Explain the requirement of GV.OV-03.
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
What outcome is expected by GV.OV-03?
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.OV-03.063? (Ex1)
Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives
Explain GV.OV-03.063.
Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives
What is GV.OV-03.064? (Ex2)
Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact
Explain GV.OV-03.064.
Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact
What is GV.OV-03.065? (Ex3)
Collect and communicate metrics on cybersecurity risk management with senior leadership
Explain GV.OV-03.065.
Collect and communicate metrics on cybersecurity risk management with senior leadership
What is GV.SC? (Cybersecurity Supply Chain Risk Management)
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
Summarize the scope of GV.SC.
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
What does GV.SC cover?
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
What is GV.SC-01?
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
Explain the requirement of GV.SC-01.
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
What outcome is expected by GV.SC-01?
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
What is GV.SC-01.066? (Ex1)
Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program
Explain GV.SC-01.066.
Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program
What is GV.SC-01.067? (Ex2)
Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders
Explain GV.SC-01.067.
Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders
What is GV.SC-01.068? (Ex3)
Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders
Explain GV.SC-01.068.
Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders
What is GV.SC-01.069? (Ex4)
Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering
Explain GV.SC-01.069.
Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-02?
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
Explain the requirement of GV.SC-02.
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
What outcome is expected by GV.SC-02?
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
What is GV.SC-02.070? (Ex1)
Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities
Explain GV.SC-02.070.
Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities
What is GV.SC-02.071? (Ex2)
Document cybersecurity supply chain risk management roles and responsibilities in policy
Explain GV.SC-02.071.
Document cybersecurity supply chain risk management roles and responsibilities in policy
What is GV.SC-02.072? (Ex3)
Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed
Explain GV.SC-02.072.
Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed
What is GV.SC-02.073? (Ex4)
Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability
Explain GV.SC-02.073.
Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability
What is GV.SC-02.074? (Ex5)
Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance
Explain GV.SC-02.074.
Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance
What is GV.SC-02.075? (Ex6)
Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements
Explain GV.SC-02.075.
Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements
What is GV.SC-02.076? (Ex7)
Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties
Explain GV.SC-02.076.
Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties
What is GV.SC-02.077? (Ex8)
Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers
Explain GV.SC-02.077.
Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers