instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-03?
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
Explain the requirement of GV.SC-03.
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
What outcome is expected by GV.SC-03?
Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
What is GV.SC-03.078? (Ex1)
Identify areas of alignment and overlap with cybersecurity and enterprise risk management
Explain GV.SC-03.078.
Identify areas of alignment and overlap with cybersecurity and enterprise risk management
What is GV.SC-03.079? (Ex2)
Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management
Explain GV.SC-03.079.
Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management
What is GV.SC-03.080? (Ex3)
Integrate cybersecurity supply chain risk management into improvement processes
Explain GV.SC-03.080.
Integrate cybersecurity supply chain risk management into improvement processes
What is GV.SC-03.081? (Ex4)
Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level
Explain GV.SC-03.081.
Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-04?
Suppliers are known and prioritized by criticality
Explain the requirement of GV.SC-04.
Suppliers are known and prioritized by criticality
What outcome is expected by GV.SC-04?
Suppliers are known and prioritized by criticality
What is GV.SC-04.082? (Ex1)
Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission
Explain GV.SC-04.082.
Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission
What is GV.SC-04.083? (Ex2)
Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria
Explain GV.SC-04.083.
Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-05?
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
Explain the requirement of GV.SC-05.
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
What outcome is expected by GV.SC-05?
Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
What is GV.SC-05.084? (Ex1)
Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
Explain GV.SC-05.084.
Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
What is GV.SC-05.085? (Ex2)
Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language
Explain GV.SC-05.085.
Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language
What is GV.SC-05.086? (Ex3)
Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
Explain GV.SC-05.086.
Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
What is GV.SC-05.087? (Ex4)
Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised
Explain GV.SC-05.087.
Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised
What is GV.SC-05.088? (Ex5)
Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle
Explain GV.SC-05.088.
Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle
What is GV.SC-05.089? (Ex6)
Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service
Explain GV.SC-05.089.
Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service
What is GV.SC-05.090? (Ex7)
Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products
Explain GV.SC-05.090.
Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products
What is GV.SC-05.091? (Ex8)
Contractually require suppliers to vet their employees and guard against insider threats
Explain GV.SC-05.091.
Contractually require suppliers to vet their employees and guard against insider threats
What is GV.SC-05.092? (Ex9)
Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections
Explain GV.SC-05.092.
Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections
What is GV.SC-05.093? (Ex10)
Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks
Explain GV.SC-05.093.
Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-06?
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
Explain the requirement of GV.SC-06.
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
What outcome is expected by GV.SC-06?
Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships
What is GV.SC-06.094? (Ex1)
Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship
Explain GV.SC-06.094.
Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship
What is GV.SC-06.095? (Ex2)
Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers
Explain GV.SC-06.095.
Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers
What is GV.SC-06.096? (Ex3)
Conduct supplier risk assessments against business and applicable cybersecurity requirements
Explain GV.SC-06.096.
Conduct supplier risk assessments against business and applicable cybersecurity requirements
What is GV.SC-06.097? (Ex4)
Assess the authenticity, integrity, and security of critical products prior to acquisition and use
Explain GV.SC-06.097.
Assess the authenticity, integrity, and security of critical products prior to acquisition and use
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-07?
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
Explain the requirement of GV.SC-07.
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
What outcome is expected by GV.SC-07?
The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship
What is GV.SC-07.098? (Ex1)
Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide
Explain GV.SC-07.098.
Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide
What is GV.SC-07.099? (Ex2)
Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts
Explain GV.SC-07.099.
Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts
What is GV.SC-07.100? (Ex3)
Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation
Explain GV.SC-07.100.
Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation
What is GV.SC-07.101? (Ex4)
Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly
Explain GV.SC-07.101.
Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly
What is GV.SC-07.102? (Ex5)
Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity
Explain GV.SC-07.102.
Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-08?
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
Explain the requirement of GV.SC-08.
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
What outcome is expected by GV.SC-08?
Relevant suppliers and other third parties are included in incident planning, response, and recovery activities
What is GV.SC-08.103? (Ex1)
Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers
Explain GV.SC-08.103.
Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers
What is GV.SC-08.104? (Ex2)
Identify and document the roles and responsibilities of the organization and its suppliers for incident response
Explain GV.SC-08.104.
Identify and document the roles and responsibilities of the organization and its suppliers for incident response
What is GV.SC-08.105? (Ex3)
Include critical suppliers in incident response exercises and simulations
Explain GV.SC-08.105.
Include critical suppliers in incident response exercises and simulations
What is GV.SC-08.106? (Ex4)
Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers
Explain GV.SC-08.106.
Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers
What is GV.SC-08.107? (Ex5)
Conduct collaborative lessons learned sessions with critical suppliers
Explain GV.SC-08.107.
Conduct collaborative lessons learned sessions with critical suppliers
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-09?
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
Explain the requirement of GV.SC-09.
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
What outcome is expected by GV.SC-09?
Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
What is GV.SC-09.108? (Ex1)
Policies and procedures require provenance records for all acquired technology products and services
Explain GV.SC-09.108.
Policies and procedures require provenance records for all acquired technology products and services
What is GV.SC-09.109? (Ex2)
Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic
Explain GV.SC-09.109.
Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic
What is GV.SC-09.110? (Ex3)
Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers