Dataset Viewer
instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
---|---|---|
What is GV? (GOVERN)
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
Summarize the scope of GV.
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
What does GV cover?
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
What is GV.OC? (Organizational Context)
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
Summarize the scope of GV.OC.
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
What does GV.OC cover?
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
What is GV.OC-01?
|
The organizational mission is understood and informs cybersecurity risk management
|
|
Explain the requirement of GV.OC-01.
|
The organizational mission is understood and informs cybersecurity risk management
|
|
What outcome is expected by GV.OC-01?
|
The organizational mission is understood and informs cybersecurity risk management
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.OC-01.001? (Ex1)
|
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
|
|
Explain GV.OC-01.001.
|
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
|
|
What is GV.OC-02?
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
Explain the requirement of GV.OC-02.
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
What outcome is expected by GV.OC-02?
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-02.002? (Ex1)
|
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
|
|
Explain GV.OC-02.002.
|
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
|
|
What is GV.OC-02.003? (Ex2)
|
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
|
|
Explain GV.OC-02.003.
|
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
|
|
What is GV.OC-03?
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
Explain the requirement of GV.OC-03.
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
What outcome is expected by GV.OC-03?
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-03.004? (Ex1)
|
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
|
|
Explain GV.OC-03.004.
|
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
|
|
What is GV.OC-03.005? (Ex2)
|
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
|
|
Explain GV.OC-03.005.
|
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
|
|
What is GV.OC-03.006? (Ex3)
|
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
|
|
Explain GV.OC-03.006.
|
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
|
|
What is GV.OC-04?
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
Explain the requirement of GV.OC-04.
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
What outcome is expected by GV.OC-04?
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-04.007? (Ex1)
|
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
|
|
Explain GV.OC-04.007.
|
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
|
|
What is GV.OC-04.008? (Ex2)
|
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
|
|
Explain GV.OC-04.008.
|
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
|
|
What is GV.OC-04.009? (Ex3)
|
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
|
|
Explain GV.OC-04.009.
|
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
|
|
What is GV.OC-05?
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
Explain the requirement of GV.OC-05.
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
What outcome is expected by GV.OC-05?
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
What is GV.OC-05.010? (Ex1)
|
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
|
|
Explain GV.OC-05.010.
|
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
|
|
What is GV.OC-05.011? (Ex2)
|
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
|
|
Explain GV.OC-05.011.
|
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RM? (Risk Management Strategy)
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
Summarize the scope of GV.RM.
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
What does GV.RM cover?
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
What is GV.RM-01?
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
Explain the requirement of GV.RM-01.
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
What outcome is expected by GV.RM-01?
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-01.012? (Ex1)
|
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
|
|
Explain GV.RM-01.012.
|
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
|
|
What is GV.RM-01.013? (Ex2)
|
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
|
|
Explain GV.RM-01.013.
|
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
|
|
What is GV.RM-01.014? (Ex3)
|
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
|
|
Explain GV.RM-01.014.
|
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
|
|
What is GV.RM-02?
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
Explain the requirement of GV.RM-02.
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
What outcome is expected by GV.RM-02?
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RM-02.015? (Ex1)
|
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
|
|
Explain GV.RM-02.015.
|
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
|
|
What is GV.RM-02.016? (Ex2)
|
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
|
|
Explain GV.RM-02.016.
|
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
|
|
What is GV.RM-02.017? (Ex3)
|
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
|
|
Explain GV.RM-02.017.
|
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
|
|
What is GV.RM-03?
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
Explain the requirement of GV.RM-03.
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
What outcome is expected by GV.RM-03?
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-03.018? (Ex1)
|
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
|
|
Explain GV.RM-03.018.
|
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
|
|
What is GV.RM-03.019? (Ex2)
|
Include cybersecurity risk managers in enterprise risk management planning
|
|
Explain GV.RM-03.019.
|
Include cybersecurity risk managers in enterprise risk management planning
|
|
What is GV.RM-03.020? (Ex3)
|
Establish criteria for escalating cybersecurity risks within enterprise risk management
|
|
Explain GV.RM-03.020.
|
Establish criteria for escalating cybersecurity risks within enterprise risk management
|
|
What is GV.RM-04?
|
Strategic direction that describes appropriate risk response options is established and communicated
|
|
Explain the requirement of GV.RM-04.
|
Strategic direction that describes appropriate risk response options is established and communicated
|
|
What outcome is expected by GV.RM-04?
|
Strategic direction that describes appropriate risk response options is established and communicated
|
End of preview. Expand
in Data Studio
Dataset Card for GRC NIST CSF 2.0 QA Dataset (v1)
This dataset contains question–answer and dialogue pairs based on the NIST Cybersecurity Framework (CSF) 2.0.
It is intended for training large language models to provide Governance, Risk, and Compliance (GRC) guidance.
Dataset Details
Dataset Sources
- Repository: https://huggingface.co/datasets/zeezhu/grc-nist-csf2-qa-v1
- Paper [optional]: NIST CSF 2.0 (official source: https://www.nist.gov/cyberframework)
- Demo [optional]: None yet
Uses
Direct Use
- Fine-tuning instruction-following models (e.g., LLaMA, Mistral, Qwen).
- Training chat assistants for cybersecurity and compliance.
- Educational tools for NGOs, SMEs, and consultants who need simplified NIST CSF guidance.
Out-of-Scope Use
- Not a replacement for legal, regulatory, or compliance advice.
- Not suitable as the only source for enterprise risk assessments.
- Should not be used for critical decision-making without human review.
Dataset Structure
alpaca.jsonl: Instruction–input–output triples.
- Fields:
instruction
(string)input
(string, optional)output
(string)
- Fields:
chatml.jsonl: Chat-formatted dialogues.
- Fields:
messages
: list of objects withrole
(system
,user
,assistant
) andcontent
(string).
- Fields:
Splits: Current version contains a single combined dataset (~3,300 records). Users may create
train/validation/test
splits using random sampling or Unsloth utilities.
Dataset Creation
Curation Rationale
Created to provide structured Q&A data around the NIST CSF 2.0 framework, enabling AI models to learn compliance concepts in an approachable format.
Source Data
Data Collection and Processing
- Extracted from NIST CSF 2.0 JSON exports.
- Reformatted into Alpaca and ChatML formats for model fine-tuning.
- Quality checks: ensured valid JSONL (UTF-8), removed empty or duplicate entries.
Who are the source data producers?
- Primary source: NIST (official CSF 2.0 framework text).
- Reformatted and curated by the GRCora Project team.
Annotations
- No manual human annotations; transformation was automated.
Personal and Sensitive Information
- Dataset does not contain personal, sensitive, or private data.
- Content is limited to framework descriptions and compliance Q&A.
Bias, Risks, and Limitations
- Bias: Only covers NIST CSF 2.0; does not reflect other frameworks equally (e.g., ISO 27001, SOC 2).
- Risk: Users may mistake generated answers as authoritative compliance advice.
- Limitations: Simplified responses may not capture full legal/regulatory complexity.
Recommendations
- Use as training/evaluation data, not as a compliance checklist.
- Pair with domain expert review for production use.
Citation
BibTeX:
@misc{grc_nist_csf2_qa,
title = {GRC NIST CSF 2.0 QA Dataset (v1)},
author = {A.O.A},
year = {2025},
howpublished = {Hugging Face Datasets},
url = {https://huggingface.co/datasets/zeezhu/grc-nist-csf2-qa-v1}
}
APA:
A.O.A. (2025). GRC NIST CSF 2.0 QA Dataset (v1) [Dataset]. Hugging Face. https://huggingface.co/datasets/zeezhu/grc-nist-csf2-qa-v1
Glossary
NIST CSF 2.0: National Institute of Standards and Technology Cybersecurity Framework, version 2.0.
GRC: Governance, Risk, and Compliance.
Alpaca format: Instruction–input–output JSONL structure used in fine-tuning.
ChatML: Chat-format schema for conversational AI training.
More Information
NIST CSF 2.0 official page: https://www.nist.gov/cyberframework
Dataset curated as part of GRCora (AI-driven GRC SaaS project).
Dataset Card Authors
A.O.A (curator, dataset creator)
Dataset Card Contact
Hugging Face: https://huggingface.co/zeezhu
- Downloads last month
- 81
Curated by:
Independent GRCora Project (educational initiative)
Funded by [optional]:
None
Shared by [optional]:
zeezhu (Hugging Face username)
Language(s) (NLP):
English
License:
Apache-2.0 (permissive, allows reuse with attribution)
Size of downloaded dataset files:
1.25 MB
Size of the auto-converted Parquet files:
196 kB
Number of rows:
6,696