instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
What is GV.PO? (Policy)
|
Organizational cybersecurity policy is established, communicated, and enforced
|
|
Summarize the scope of GV.PO.
|
Organizational cybersecurity policy is established, communicated, and enforced
|
|
What does GV.PO cover?
|
Organizational cybersecurity policy is established, communicated, and enforced
|
|
What is GV.PO-01?
|
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
|
|
Explain the requirement of GV.PO-01.
|
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
|
|
What outcome is expected by GV.PO-01?
|
Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.PO-01.049? (Ex1)
|
Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction
|
|
Explain GV.PO-01.049.
|
Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction
|
|
What is GV.PO-01.050? (Ex2)
|
Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy
|
|
Explain GV.PO-01.050.
|
Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy
|
|
What is GV.PO-01.051? (Ex3)
|
Require approval from senior management on policy
|
|
Explain GV.PO-01.051.
|
Require approval from senior management on policy
|
|
What is GV.PO-01.052? (Ex4)
|
Communicate cybersecurity risk management policy and supporting processes and procedures across the organization
|
|
Explain GV.PO-01.052.
|
Communicate cybersecurity risk management policy and supporting processes and procedures across the organization
|
|
What is GV.PO-01.053? (Ex5)
|
Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated
|
|
Explain GV.PO-01.053.
|
Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated
|
|
What is GV.PO-02?
|
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
|
|
Explain the requirement of GV.PO-02.
|
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
|
|
What outcome is expected by GV.PO-02?
|
Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.PO-02.054? (Ex1)
|
Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level
|
|
Explain GV.PO-02.054.
|
Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level
|
|
What is GV.PO-02.055? (Ex2)
|
Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates
|
|
Explain GV.PO-02.055.
|
Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates
|
|
What is GV.PO-02.056? (Ex3)
|
Update policy to reflect changes in legal and regulatory requirements
|
|
Explain GV.PO-02.056.
|
Update policy to reflect changes in legal and regulatory requirements
|
|
What is GV.PO-02.057? (Ex4)
|
Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)
|
|
Explain GV.PO-02.057.
|
Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)
|
|
What is GV.OV? (Oversight)
|
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
|
|
Summarize the scope of GV.OV.
|
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
|
|
What does GV.OV cover?
|
Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
|
|
What is GV.OV-01?
|
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
|
|
Explain the requirement of GV.OV-01.
|
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
|
|
What outcome is expected by GV.OV-01?
|
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.OV-01.058? (Ex1)
|
Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives
|
|
Explain GV.OV-01.058.
|
Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives
|
|
What is GV.OV-01.059? (Ex2)
|
Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted
|
|
Explain GV.OV-01.059.
|
Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted
|
|
What is GV.OV-02?
|
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
|
|
Explain the requirement of GV.OV-02.
|
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
|
|
What outcome is expected by GV.OV-02?
|
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.OV-02.060? (Ex1)
|
Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements
|
|
Explain GV.OV-02.060.
|
Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements
|
|
What is GV.OV-02.061? (Ex2)
|
Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary
|
|
Explain GV.OV-02.061.
|
Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary
|
|
What is GV.OV-02.062? (Ex3)
|
Review strategy in light of cybersecurity incidents
|
|
Explain GV.OV-02.062.
|
Review strategy in light of cybersecurity incidents
|
|
What is GV.OV-03?
|
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
|
|
Explain the requirement of GV.OV-03.
|
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
|
|
What outcome is expected by GV.OV-03?
|
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.OV-03.063? (Ex1)
|
Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives
|
|
Explain GV.OV-03.063.
|
Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives
|
|
What is GV.OV-03.064? (Ex2)
|
Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact
|
|
Explain GV.OV-03.064.
|
Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact
|
|
What is GV.OV-03.065? (Ex3)
|
Collect and communicate metrics on cybersecurity risk management with senior leadership
|
|
Explain GV.OV-03.065.
|
Collect and communicate metrics on cybersecurity risk management with senior leadership
|
|
What is GV.SC? (Cybersecurity Supply Chain Risk Management)
|
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
|
|
Summarize the scope of GV.SC.
|
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
|
|
What does GV.SC cover?
|
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
|
|
What is GV.SC-01?
|
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
|
|
Explain the requirement of GV.SC-01.
|
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
|
|
What outcome is expected by GV.SC-01?
|
A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
|
|
What is GV.SC-01.066? (Ex1)
|
Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program
|
|
Explain GV.SC-01.066.
|
Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program
|
|
What is GV.SC-01.067? (Ex2)
|
Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders
|
|
Explain GV.SC-01.067.
|
Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders
|
|
What is GV.SC-01.068? (Ex3)
|
Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders
|
|
Explain GV.SC-01.068.
|
Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders
|
|
What is GV.SC-01.069? (Ex4)
|
Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering
|
|
Explain GV.SC-01.069.
|
Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-02?
|
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
|
|
Explain the requirement of GV.SC-02.
|
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
|
|
What outcome is expected by GV.SC-02?
|
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally
|
|
What is GV.SC-02.070? (Ex1)
|
Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities
|
|
Explain GV.SC-02.070.
|
Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities
|
|
What is GV.SC-02.071? (Ex2)
|
Document cybersecurity supply chain risk management roles and responsibilities in policy
|
|
Explain GV.SC-02.071.
|
Document cybersecurity supply chain risk management roles and responsibilities in policy
|
|
What is GV.SC-02.072? (Ex3)
|
Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed
|
|
Explain GV.SC-02.072.
|
Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed
|
|
What is GV.SC-02.073? (Ex4)
|
Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability
|
|
Explain GV.SC-02.073.
|
Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability
|
|
What is GV.SC-02.074? (Ex5)
|
Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance
|
|
Explain GV.SC-02.074.
|
Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance
|
|
What is GV.SC-02.075? (Ex6)
|
Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements
|
|
Explain GV.SC-02.075.
|
Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements
|
|
What is GV.SC-02.076? (Ex7)
|
Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties
|
|
Explain GV.SC-02.076.
|
Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties
|
|
What is GV.SC-02.077? (Ex8)
|
Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers
|
|
Explain GV.SC-02.077.
|
Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.