Dataset Viewer
Auto-converted to Parquet
instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is GV? (GOVERN)
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
Summarize the scope of GV.
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
What does GV cover?
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
What is GV.OC? (Organizational Context)
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
Summarize the scope of GV.OC.
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
What does GV.OC cover?
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
What is GV.OC-01?
The organizational mission is understood and informs cybersecurity risk management
Explain the requirement of GV.OC-01.
The organizational mission is understood and informs cybersecurity risk management
What outcome is expected by GV.OC-01?
The organizational mission is understood and informs cybersecurity risk management
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.OC-01.001? (Ex1)
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
Explain GV.OC-01.001.
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
What is GV.OC-02?
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Explain the requirement of GV.OC-02.
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
What outcome is expected by GV.OC-02?
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-02.002? (Ex1)
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
Explain GV.OC-02.002.
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
What is GV.OC-02.003? (Ex2)
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
Explain GV.OC-02.003.
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
What is GV.OC-03?
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
Explain the requirement of GV.OC-03.
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
What outcome is expected by GV.OC-03?
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-03.004? (Ex1)
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
Explain GV.OC-03.004.
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
What is GV.OC-03.005? (Ex2)
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
Explain GV.OC-03.005.
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
What is GV.OC-03.006? (Ex3)
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
Explain GV.OC-03.006.
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
What is GV.OC-04?
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
Explain the requirement of GV.OC-04.
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
What outcome is expected by GV.OC-04?
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-04.007? (Ex1)
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
Explain GV.OC-04.007.
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
What is GV.OC-04.008? (Ex2)
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
Explain GV.OC-04.008.
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
What is GV.OC-04.009? (Ex3)
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
Explain GV.OC-04.009.
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
What is GV.OC-05?
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Explain the requirement of GV.OC-05.
Outcomes, capabilities, and services that the organization depends on are understood and communicated
What outcome is expected by GV.OC-05?
Outcomes, capabilities, and services that the organization depends on are understood and communicated
What is GV.OC-05.010? (Ex1)
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
Explain GV.OC-05.010.
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
What is GV.OC-05.011? (Ex2)
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
Explain GV.OC-05.011.
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RM? (Risk Management Strategy)
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
Summarize the scope of GV.RM.
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
What does GV.RM cover?
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
What is GV.RM-01?
Risk management objectives are established and agreed to by organizational stakeholders
Explain the requirement of GV.RM-01.
Risk management objectives are established and agreed to by organizational stakeholders
What outcome is expected by GV.RM-01?
Risk management objectives are established and agreed to by organizational stakeholders
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-01.012? (Ex1)
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
Explain GV.RM-01.012.
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
What is GV.RM-01.013? (Ex2)
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
Explain GV.RM-01.013.
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
What is GV.RM-01.014? (Ex3)
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
Explain GV.RM-01.014.
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
What is GV.RM-02?
Risk appetite and risk tolerance statements are established, communicated, and maintained
Explain the requirement of GV.RM-02.
Risk appetite and risk tolerance statements are established, communicated, and maintained
What outcome is expected by GV.RM-02?
Risk appetite and risk tolerance statements are established, communicated, and maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RM-02.015? (Ex1)
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
Explain GV.RM-02.015.
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
What is GV.RM-02.016? (Ex2)
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
Explain GV.RM-02.016.
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
What is GV.RM-02.017? (Ex3)
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
Explain GV.RM-02.017.
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
What is GV.RM-03?
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Explain the requirement of GV.RM-03.
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
What outcome is expected by GV.RM-03?
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-03.018? (Ex1)
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
Explain GV.RM-03.018.
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
What is GV.RM-03.019? (Ex2)
Include cybersecurity risk managers in enterprise risk management planning
Explain GV.RM-03.019.
Include cybersecurity risk managers in enterprise risk management planning
What is GV.RM-03.020? (Ex3)
Establish criteria for escalating cybersecurity risks within enterprise risk management
Explain GV.RM-03.020.
Establish criteria for escalating cybersecurity risks within enterprise risk management
What is GV.RM-04?
Strategic direction that describes appropriate risk response options is established and communicated
Explain the requirement of GV.RM-04.
Strategic direction that describes appropriate risk response options is established and communicated
What outcome is expected by GV.RM-04?
Strategic direction that describes appropriate risk response options is established and communicated
End of preview. Expand in Data Studio

Dataset Card for GRC NIST CSF 2.0 QA Dataset (v1)

This dataset contains question–answer and dialogue pairs based on the NIST Cybersecurity Framework (CSF) 2.0.
It is intended for training large language models to provide Governance, Risk, and Compliance (GRC) guidance.


Dataset Details

Dataset Sources


Uses

Direct Use

  • Fine-tuning instruction-following models (e.g., LLaMA, Mistral, Qwen).
  • Training chat assistants for cybersecurity and compliance.
  • Educational tools for NGOs, SMEs, and consultants who need simplified NIST CSF guidance.

Out-of-Scope Use

  • Not a replacement for legal, regulatory, or compliance advice.
  • Not suitable as the only source for enterprise risk assessments.
  • Should not be used for critical decision-making without human review.

Dataset Structure

  • alpaca.jsonl: Instruction–input–output triples.

    • Fields:
      • instruction (string)
      • input (string, optional)
      • output (string)
  • chatml.jsonl: Chat-formatted dialogues.

    • Fields:
      • messages: list of objects with role (system, user, assistant) and content (string).
  • Splits: Current version contains a single combined dataset (~3,300 records). Users may create train/validation/test splits using random sampling or Unsloth utilities.


Dataset Creation

Curation Rationale

Created to provide structured Q&A data around the NIST CSF 2.0 framework, enabling AI models to learn compliance concepts in an approachable format.

Source Data

Data Collection and Processing

  • Extracted from NIST CSF 2.0 JSON exports.
  • Reformatted into Alpaca and ChatML formats for model fine-tuning.
  • Quality checks: ensured valid JSONL (UTF-8), removed empty or duplicate entries.

Who are the source data producers?

  • Primary source: NIST (official CSF 2.0 framework text).
  • Reformatted and curated by the GRCora Project team.

Annotations

  • No manual human annotations; transformation was automated.

Personal and Sensitive Information

  • Dataset does not contain personal, sensitive, or private data.
  • Content is limited to framework descriptions and compliance Q&A.

Bias, Risks, and Limitations

  • Bias: Only covers NIST CSF 2.0; does not reflect other frameworks equally (e.g., ISO 27001, SOC 2).
  • Risk: Users may mistake generated answers as authoritative compliance advice.
  • Limitations: Simplified responses may not capture full legal/regulatory complexity.

Recommendations

  • Use as training/evaluation data, not as a compliance checklist.
  • Pair with domain expert review for production use.

Citation

BibTeX:

@misc{grc_nist_csf2_qa,
  title        = {GRC NIST CSF 2.0 QA Dataset (v1)},
  author       = {A.O.A},
  year         = {2025},
  howpublished = {Hugging Face Datasets},
  url          = {https://huggingface.co/datasets/zeezhu/grc-nist-csf2-qa-v1}
}
APA:
A.O.A. (2025). GRC NIST CSF 2.0 QA Dataset (v1) [Dataset]. Hugging Face. https://huggingface.co/datasets/zeezhu/grc-nist-csf2-qa-v1

Glossary

NIST CSF 2.0: National Institute of Standards and Technology Cybersecurity Framework, version 2.0.

GRC: Governance, Risk, and Compliance.

Alpaca format: Instruction–input–output JSONL structure used in fine-tuning.

ChatML: Chat-format schema for conversational AI training.

More Information

NIST CSF 2.0 official page: https://www.nist.gov/cyberframework

Dataset curated as part of GRCora (AI-driven GRC SaaS project).

Dataset Card Authors

A.O.A (curator, dataset creator)

Dataset Card Contact

Hugging Face: https://huggingface.co/zeezhu
Downloads last month
81