instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
Explain GV.SC-09.110.
Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers
What is GV.SC-09.111? (Ex4)
Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products
Explain GV.SC-09.111.
Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products
What is GV.SC-09.112? (Ex5)
Policies and procedure require checking upgrades to critical hardware for unauthorized changes
Explain GV.SC-09.112.
Policies and procedure require checking upgrades to critical hardware for unauthorized changes
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.SC-10?
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
Explain the requirement of GV.SC-10.
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
What outcome is expected by GV.SC-10?
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
What is GV.SC-10.113? (Ex1)
Establish processes for terminating critical relationships under both normal and adverse circumstances
Explain GV.SC-10.113.
Establish processes for terminating critical relationships under both normal and adverse circumstances
What is GV.SC-10.114? (Ex2)
Define and implement plans for component end-of-life maintenance support and obsolescence
Explain GV.SC-10.114.
Define and implement plans for component end-of-life maintenance support and obsolescence
What is GV.SC-10.115? (Ex3)
Verify that supplier access to organization resources is deactivated promptly when it is no longer needed
Explain GV.SC-10.115.
Verify that supplier access to organization resources is deactivated promptly when it is no longer needed
What is GV.SC-10.116? (Ex4)
Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner
Explain GV.SC-10.116.
Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner
What is GV.SC-10.117? (Ex5)
Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account
Explain GV.SC-10.117.
Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account
What is GV.SC-10.118? (Ex6)
Mitigate risks to data and systems created by supplier termination
Explain GV.SC-10.118.
Mitigate risks to data and systems created by supplier termination
What is GV.SC-10.119? (Ex7)
Manage data leakage risks associated with supplier termination
Explain GV.SC-10.119.
Manage data leakage risks associated with supplier termination
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID? (IDENTIFY)
The organization's current cybersecurity risks are understood
Summarize the scope of ID.
The organization's current cybersecurity risks are understood
What does ID cover?
The organization's current cybersecurity risks are understood
What is ID.AM? (Asset Management)
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
Summarize the scope of ID.AM.
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
What does ID.AM cover?
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
What is ID.AM-01?
Inventories of hardware managed by the organization are maintained
Explain the requirement of ID.AM-01.
Inventories of hardware managed by the organization are maintained
What outcome is expected by ID.AM-01?
Inventories of hardware managed by the organization are maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.AM-01.120? (Ex1)
Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices
Explain ID.AM-01.120.
Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices
What is ID.AM-01.121? (Ex2)
Constantly monitor networks to detect new hardware and automatically update inventories
Explain ID.AM-01.121.
Constantly monitor networks to detect new hardware and automatically update inventories
What is ID.AM-02?
Inventories of software, services, and systems managed by the organization are maintained
Explain the requirement of ID.AM-02.
Inventories of software, services, and systems managed by the organization are maintained
What outcome is expected by ID.AM-02?
Inventories of software, services, and systems managed by the organization are maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.AM-02.122? (Ex1)
Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services
Explain ID.AM-02.122.
Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services
What is ID.AM-02.123? (Ex2)
Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes
Explain ID.AM-02.123.
Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes
What is ID.AM-02.124? (Ex3)
Maintain an inventory of the organization's systems
Explain ID.AM-02.124.
Maintain an inventory of the organization's systems
What is ID.AM-03?
Representations of the organization's authorized network communication and internal and external network data flows are maintained
Explain the requirement of ID.AM-03.
Representations of the organization's authorized network communication and internal and external network data flows are maintained
What outcome is expected by ID.AM-03?
Representations of the organization's authorized network communication and internal and external network data flows are maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.AM-03.125? (Ex1)
Maintain baselines of communication and data flows within the organization's wired and wireless networks
Explain ID.AM-03.125.
Maintain baselines of communication and data flows within the organization's wired and wireless networks
What is ID.AM-03.126? (Ex2)
Maintain baselines of communication and data flows between the organization and third parties
Explain ID.AM-03.126.
Maintain baselines of communication and data flows between the organization and third parties
What is ID.AM-03.127? (Ex3)
Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage
Explain ID.AM-03.127.
Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage
What is ID.AM-03.128? (Ex4)
Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems
Explain ID.AM-03.128.
Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems
What is ID.AM-04?
Inventories of services provided by suppliers are maintained
Explain the requirement of ID.AM-04.
Inventories of services provided by suppliers are maintained
What outcome is expected by ID.AM-04?
Inventories of services provided by suppliers are maintained
What is ID.AM-04.129? (Ex1)
Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services
Explain ID.AM-04.129.
Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services
What is ID.AM-04.130? (Ex2)
Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service
Explain ID.AM-04.130.
Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.AM-05?
Assets are prioritized based on classification, criticality, resources, and impact on the mission
Explain the requirement of ID.AM-05.
Assets are prioritized based on classification, criticality, resources, and impact on the mission
What outcome is expected by ID.AM-05?
Assets are prioritized based on classification, criticality, resources, and impact on the mission
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.AM-05.131? (Ex1)
Define criteria for prioritizing each class of assets
Explain ID.AM-05.131.
Define criteria for prioritizing each class of assets
What is ID.AM-05.132? (Ex2)
Apply the prioritization criteria to assets
Explain ID.AM-05.132.
Apply the prioritization criteria to assets
What is ID.AM-05.133? (Ex3)
Track the asset priorities and update them periodically or when significant changes to the organization occur
Explain ID.AM-05.133.
Track the asset priorities and update them periodically or when significant changes to the organization occur
What is ID.AM-06?
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
Explain the requirement of ID.AM-06.
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
What outcome is expected by ID.AM-06?
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
What is WR-ID.AM-06?
Incorporated into GV.RR-02, GV.SC-02
Explain WR-ID.AM-06.
Incorporated into GV.RR-02, GV.SC-02
What is ID.AM-07?
Inventories of data and corresponding metadata for designated data types are maintained
Explain the requirement of ID.AM-07.
Inventories of data and corresponding metadata for designated data types are maintained
What outcome is expected by ID.AM-07?
Inventories of data and corresponding metadata for designated data types are maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.AM-07.134? (Ex1)
Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)
Explain ID.AM-07.134.
Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)
What is ID.AM-07.135? (Ex2)
Continuously discover and analyze ad hoc data to identify new instances of designated data types