instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
Explain GV.SC-09.110.
|
Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers
|
|
What is GV.SC-09.111? (Ex4)
|
Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products
|
|
Explain GV.SC-09.111.
|
Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products
|
|
What is GV.SC-09.112? (Ex5)
|
Policies and procedure require checking upgrades to critical hardware for unauthorized changes
|
|
Explain GV.SC-09.112.
|
Policies and procedure require checking upgrades to critical hardware for unauthorized changes
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.SC-10?
|
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
|
|
Explain the requirement of GV.SC-10.
|
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
|
|
What outcome is expected by GV.SC-10?
|
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
|
|
What is GV.SC-10.113? (Ex1)
|
Establish processes for terminating critical relationships under both normal and adverse circumstances
|
|
Explain GV.SC-10.113.
|
Establish processes for terminating critical relationships under both normal and adverse circumstances
|
|
What is GV.SC-10.114? (Ex2)
|
Define and implement plans for component end-of-life maintenance support and obsolescence
|
|
Explain GV.SC-10.114.
|
Define and implement plans for component end-of-life maintenance support and obsolescence
|
|
What is GV.SC-10.115? (Ex3)
|
Verify that supplier access to organization resources is deactivated promptly when it is no longer needed
|
|
Explain GV.SC-10.115.
|
Verify that supplier access to organization resources is deactivated promptly when it is no longer needed
|
|
What is GV.SC-10.116? (Ex4)
|
Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner
|
|
Explain GV.SC-10.116.
|
Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner
|
|
What is GV.SC-10.117? (Ex5)
|
Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account
|
|
Explain GV.SC-10.117.
|
Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account
|
|
What is GV.SC-10.118? (Ex6)
|
Mitigate risks to data and systems created by supplier termination
|
|
Explain GV.SC-10.118.
|
Mitigate risks to data and systems created by supplier termination
|
|
What is GV.SC-10.119? (Ex7)
|
Manage data leakage risks associated with supplier termination
|
|
Explain GV.SC-10.119.
|
Manage data leakage risks associated with supplier termination
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID? (IDENTIFY)
|
The organization's current cybersecurity risks are understood
|
|
Summarize the scope of ID.
|
The organization's current cybersecurity risks are understood
|
|
What does ID cover?
|
The organization's current cybersecurity risks are understood
|
|
What is ID.AM? (Asset Management)
|
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
|
|
Summarize the scope of ID.AM.
|
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
|
|
What does ID.AM cover?
|
Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy
|
|
What is ID.AM-01?
|
Inventories of hardware managed by the organization are maintained
|
|
Explain the requirement of ID.AM-01.
|
Inventories of hardware managed by the organization are maintained
|
|
What outcome is expected by ID.AM-01?
|
Inventories of hardware managed by the organization are maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.AM-01.120? (Ex1)
|
Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices
|
|
Explain ID.AM-01.120.
|
Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices
|
|
What is ID.AM-01.121? (Ex2)
|
Constantly monitor networks to detect new hardware and automatically update inventories
|
|
Explain ID.AM-01.121.
|
Constantly monitor networks to detect new hardware and automatically update inventories
|
|
What is ID.AM-02?
|
Inventories of software, services, and systems managed by the organization are maintained
|
|
Explain the requirement of ID.AM-02.
|
Inventories of software, services, and systems managed by the organization are maintained
|
|
What outcome is expected by ID.AM-02?
|
Inventories of software, services, and systems managed by the organization are maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.AM-02.122? (Ex1)
|
Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services
|
|
Explain ID.AM-02.122.
|
Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services
|
|
What is ID.AM-02.123? (Ex2)
|
Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes
|
|
Explain ID.AM-02.123.
|
Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes
|
|
What is ID.AM-02.124? (Ex3)
|
Maintain an inventory of the organization's systems
|
|
Explain ID.AM-02.124.
|
Maintain an inventory of the organization's systems
|
|
What is ID.AM-03?
|
Representations of the organization's authorized network communication and internal and external network data flows are maintained
|
|
Explain the requirement of ID.AM-03.
|
Representations of the organization's authorized network communication and internal and external network data flows are maintained
|
|
What outcome is expected by ID.AM-03?
|
Representations of the organization's authorized network communication and internal and external network data flows are maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.AM-03.125? (Ex1)
|
Maintain baselines of communication and data flows within the organization's wired and wireless networks
|
|
Explain ID.AM-03.125.
|
Maintain baselines of communication and data flows within the organization's wired and wireless networks
|
|
What is ID.AM-03.126? (Ex2)
|
Maintain baselines of communication and data flows between the organization and third parties
|
|
Explain ID.AM-03.126.
|
Maintain baselines of communication and data flows between the organization and third parties
|
|
What is ID.AM-03.127? (Ex3)
|
Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage
|
|
Explain ID.AM-03.127.
|
Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage
|
|
What is ID.AM-03.128? (Ex4)
|
Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems
|
|
Explain ID.AM-03.128.
|
Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems
|
|
What is ID.AM-04?
|
Inventories of services provided by suppliers are maintained
|
|
Explain the requirement of ID.AM-04.
|
Inventories of services provided by suppliers are maintained
|
|
What outcome is expected by ID.AM-04?
|
Inventories of services provided by suppliers are maintained
|
|
What is ID.AM-04.129? (Ex1)
|
Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services
|
|
Explain ID.AM-04.129.
|
Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services
|
|
What is ID.AM-04.130? (Ex2)
|
Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service
|
|
Explain ID.AM-04.130.
|
Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.AM-05?
|
Assets are prioritized based on classification, criticality, resources, and impact on the mission
|
|
Explain the requirement of ID.AM-05.
|
Assets are prioritized based on classification, criticality, resources, and impact on the mission
|
|
What outcome is expected by ID.AM-05?
|
Assets are prioritized based on classification, criticality, resources, and impact on the mission
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.AM-05.131? (Ex1)
|
Define criteria for prioritizing each class of assets
|
|
Explain ID.AM-05.131.
|
Define criteria for prioritizing each class of assets
|
|
What is ID.AM-05.132? (Ex2)
|
Apply the prioritization criteria to assets
|
|
Explain ID.AM-05.132.
|
Apply the prioritization criteria to assets
|
|
What is ID.AM-05.133? (Ex3)
|
Track the asset priorities and update them periodically or when significant changes to the organization occur
|
|
Explain ID.AM-05.133.
|
Track the asset priorities and update them periodically or when significant changes to the organization occur
|
|
What is ID.AM-06?
|
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
|
|
Explain the requirement of ID.AM-06.
|
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
|
|
What outcome is expected by ID.AM-06?
|
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
|
|
What is WR-ID.AM-06?
|
Incorporated into GV.RR-02, GV.SC-02
|
|
Explain WR-ID.AM-06.
|
Incorporated into GV.RR-02, GV.SC-02
|
|
What is ID.AM-07?
|
Inventories of data and corresponding metadata for designated data types are maintained
|
|
Explain the requirement of ID.AM-07.
|
Inventories of data and corresponding metadata for designated data types are maintained
|
|
What outcome is expected by ID.AM-07?
|
Inventories of data and corresponding metadata for designated data types are maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.AM-07.134? (Ex1)
|
Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)
|
|
Explain ID.AM-07.134.
|
Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)
|
|
What is ID.AM-07.135? (Ex2)
|
Continuously discover and analyze ad hoc data to identify new instances of designated data types
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.