instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-03?
|
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
|
|
Explain the requirement of GV.SC-03.
|
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
|
|
What outcome is expected by GV.SC-03?
|
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
|
|
What is GV.SC-03.078? (Ex1)
|
Identify areas of alignment and overlap with cybersecurity and enterprise risk management
|
|
Explain GV.SC-03.078.
|
Identify areas of alignment and overlap with cybersecurity and enterprise risk management
|
|
What is GV.SC-03.079? (Ex2)
|
Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management
|
|
Explain GV.SC-03.079.
|
Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management
|
|
What is GV.SC-03.080? (Ex3)
|
Integrate cybersecurity supply chain risk management into improvement processes
|
|
Explain GV.SC-03.080.
|
Integrate cybersecurity supply chain risk management into improvement processes
|
|
What is GV.SC-03.081? (Ex4)
|
Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level
|
|
Explain GV.SC-03.081.
|
Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-04?
|
Suppliers are known and prioritized by criticality
|
|
Explain the requirement of GV.SC-04.
|
Suppliers are known and prioritized by criticality
|
|
What outcome is expected by GV.SC-04?
|
Suppliers are known and prioritized by criticality
|
|
What is GV.SC-04.082? (Ex1)
|
Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission
|
|
Explain GV.SC-04.082.
|
Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission
|
|
What is GV.SC-04.083? (Ex2)
|
Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria
|
|
Explain GV.SC-04.083.
|
Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-05?
|
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
|
|
Explain the requirement of GV.SC-05.
|
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
|
|
What outcome is expected by GV.SC-05?
|
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
|
|
What is GV.SC-05.084? (Ex1)
|
Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
|
|
Explain GV.SC-05.084.
|
Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
|
|
What is GV.SC-05.085? (Ex2)
|
Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language
|
|
Explain GV.SC-05.085.
|
Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language
|
|
What is GV.SC-05.086? (Ex3)
|
Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
|
|
Explain GV.SC-05.086.
|
Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
|
|
What is GV.SC-05.087? (Ex4)
|
Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised
|
|
Explain GV.SC-05.087.
|
Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised
|
|
What is GV.SC-05.088? (Ex5)
|
Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle
|
|
Explain GV.SC-05.088.
|
Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle
|
|
What is GV.SC-05.089? (Ex6)
|
Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service
|
|
Explain GV.SC-05.089.
|
Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service
|
|
What is GV.SC-05.090? (Ex7)
|
Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products
|
|
Explain GV.SC-05.090.
|
Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products
|
|
What is GV.SC-05.091? (Ex8)
|
Contractually require suppliers to vet their employees and guard against insider threats
|
|
Explain GV.SC-05.091.
|
Contractually require suppliers to vet their employees and guard against insider threats
|
|
What is GV.SC-05.092? (Ex9)
|
Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections
|
|
Explain GV.SC-05.092.
|
Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections
|
|
What is GV.SC-05.093? (Ex10)
|
Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks
|
|
Explain GV.SC-05.093.
|
Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-06?
|
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
|
|
Explain the requirement of GV.SC-06.
|
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
|
|
What outcome is expected by GV.SC-06?
|
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
|
|
What is GV.SC-06.094? (Ex1)
|
Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship
|
|
Explain GV.SC-06.094.
|
Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship
|
|
What is GV.SC-06.095? (Ex2)
|
Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers
|
|
Explain GV.SC-06.095.
|
Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers
|
|
What is GV.SC-06.096? (Ex3)
|
Conduct supplier risk assessments against business and applicable cybersecurity requirements
|
|
Explain GV.SC-06.096.
|
Conduct supplier risk assessments against business and applicable cybersecurity requirements
|
|
What is GV.SC-06.097? (Ex4)
|
Assess the authenticity, integrity, and security of critical products prior to acquisition and use
|
|
Explain GV.SC-06.097.
|
Assess the authenticity, integrity, and security of critical products prior to acquisition and use
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-07?
|
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
|
|
Explain the requirement of GV.SC-07.
|
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
|
|
What outcome is expected by GV.SC-07?
|
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
|
|
What is GV.SC-07.098? (Ex1)
|
Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide
|
|
Explain GV.SC-07.098.
|
Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide
|
|
What is GV.SC-07.099? (Ex2)
|
Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts
|
|
Explain GV.SC-07.099.
|
Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts
|
|
What is GV.SC-07.100? (Ex3)
|
Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation
|
|
Explain GV.SC-07.100.
|
Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation
|
|
What is GV.SC-07.101? (Ex4)
|
Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly
|
|
Explain GV.SC-07.101.
|
Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly
|
|
What is GV.SC-07.102? (Ex5)
|
Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity
|
|
Explain GV.SC-07.102.
|
Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-08?
|
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
|
|
Explain the requirement of GV.SC-08.
|
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
|
|
What outcome is expected by GV.SC-08?
|
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
|
|
What is GV.SC-08.103? (Ex1)
|
Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers
|
|
Explain GV.SC-08.103.
|
Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers
|
|
What is GV.SC-08.104? (Ex2)
|
Identify and document the roles and responsibilities of the organization and its suppliers for incident response
|
|
Explain GV.SC-08.104.
|
Identify and document the roles and responsibilities of the organization and its suppliers for incident response
|
|
What is GV.SC-08.105? (Ex3)
|
Include critical suppliers in incident response exercises and simulations
|
|
Explain GV.SC-08.105.
|
Include critical suppliers in incident response exercises and simulations
|
|
What is GV.SC-08.106? (Ex4)
|
Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers
|
|
Explain GV.SC-08.106.
|
Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers
|
|
What is GV.SC-08.107? (Ex5)
|
Conduct collaborative lessons learned sessions with critical suppliers
|
|
Explain GV.SC-08.107.
|
Conduct collaborative lessons learned sessions with critical suppliers
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-09?
|
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
|
|
Explain the requirement of GV.SC-09.
|
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
|
|
What outcome is expected by GV.SC-09?
|
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
|
|
What is GV.SC-09.108? (Ex1)
|
Policies and procedures require provenance records for all acquired technology products and services
|
|
Explain GV.SC-09.108.
|
Policies and procedures require provenance records for all acquired technology products and services
|
|
What is GV.SC-09.109? (Ex2)
|
Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic
|
|
Explain GV.SC-09.109.
|
Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic
|
|
What is GV.SC-09.110? (Ex3)
|
Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.