{"messages": [{"role": "user", "content": "What is GV? (GOVERN)"}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV."}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "What does GV cover?"}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "What is GV.OC? (Organizational Context)"}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.OC."}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "What does GV.OC cover?"}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "What is GV.OC-01?"}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-01."}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-01?"}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OC-01.001? (Ex1)"}, {"role": "assistant", "content": "Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-01.001."}, {"role": "assistant", "content": "Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-02."}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02.002? (Ex1)"}, {"role": "assistant", "content": "Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-02.002."}, {"role": "assistant", "content": "Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02.003? (Ex2)"}, {"role": "assistant", "content": "Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-02.003."}, {"role": "assistant", "content": "Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03?"}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-03."}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-03?"}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.004? (Ex1)"}, {"role": "assistant", "content": "Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.004."}, {"role": "assistant", "content": "Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.005? (Ex2)"}, {"role": "assistant", "content": "Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.005."}, {"role": "assistant", "content": "Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.006? (Ex3)"}, {"role": "assistant", "content": "Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.006."}, {"role": "assistant", "content": "Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04?"}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-04."}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-04?"}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.007? (Ex1)"}, {"role": "assistant", "content": "Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.007."}, {"role": "assistant", "content": "Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.008? (Ex2)"}, {"role": "assistant", "content": "Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.008."}, {"role": "assistant", "content": "Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.009? (Ex3)"}, {"role": "assistant", "content": "Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.009."}, {"role": "assistant", "content": "Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05?"}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-05."}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-05?"}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05.010? (Ex1)"}, {"role": "assistant", "content": "Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-05.010."}, {"role": "assistant", "content": "Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05.011? (Ex2)"}, {"role": "assistant", "content": "Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-05.011."}, {"role": "assistant", "content": "Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM? (Risk Management Strategy)"}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.RM."}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "What does GV.RM cover?"}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01?"}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-01."}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-01?"}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.012? (Ex1)"}, {"role": "assistant", "content": "Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.012."}, {"role": "assistant", "content": "Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.013? (Ex2)"}, {"role": "assistant", "content": "Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.013."}, {"role": "assistant", "content": "Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.014? (Ex3)"}, {"role": "assistant", "content": "Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.014."}, {"role": "assistant", "content": "Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02?"}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-02."}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-02?"}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.015? (Ex1)"}, {"role": "assistant", "content": "Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.015."}, {"role": "assistant", "content": "Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.016? (Ex2)"}, {"role": "assistant", "content": "Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.016."}, {"role": "assistant", "content": "Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.017? (Ex3)"}, {"role": "assistant", "content": "Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.017."}, {"role": "assistant", "content": "Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03?"}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-03."}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-03?"}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.018? (Ex1)"}, {"role": "assistant", "content": "Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.018."}, {"role": "assistant", "content": "Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.019? (Ex2)"}, {"role": "assistant", "content": "Include cybersecurity risk managers in enterprise risk management planning"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.019."}, {"role": "assistant", "content": "Include cybersecurity risk managers in enterprise risk management planning"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.020? (Ex3)"}, {"role": "assistant", "content": "Establish criteria for escalating cybersecurity risks within enterprise risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.020."}, {"role": "assistant", "content": "Establish criteria for escalating cybersecurity risks within enterprise risk management"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04?"}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-04."}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-04?"}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.021? (Ex1)"}, {"role": "assistant", "content": "Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.021."}, {"role": "assistant", "content": "Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.022? (Ex2)"}, {"role": "assistant", "content": "Determine whether to purchase cybersecurity insurance"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.022."}, {"role": "assistant", "content": "Determine whether to purchase cybersecurity insurance"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.023? (Ex3)"}, {"role": "assistant", "content": "Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.023."}, {"role": "assistant", "content": "Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05?"}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-05."}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-05?"}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05.024? (Ex1)"}, {"role": "assistant", "content": "Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-05.024."}, {"role": "assistant", "content": "Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05.025? (Ex2)"}, {"role": "assistant", "content": "Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-05.025."}, {"role": "assistant", "content": "Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06?"}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-06."}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-06?"}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.026? (Ex1)"}, {"role": "assistant", "content": "Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.026."}, {"role": "assistant", "content": "Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.027? (Ex2)"}, {"role": "assistant", "content": "Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.027."}, {"role": "assistant", "content": "Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.028? (Ex3)"}, {"role": "assistant", "content": "Establish criteria for risk prioritization at the appropriate levels within the enterprise"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.028."}, {"role": "assistant", "content": "Establish criteria for risk prioritization at the appropriate levels within the enterprise"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.029? (Ex4)"}, {"role": "assistant", "content": "Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.029."}, {"role": "assistant", "content": "Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07?"}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-07."}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-07?"}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.030? (Ex1)"}, {"role": "assistant", "content": "Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.030."}, {"role": "assistant", "content": "Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.031? (Ex2)"}, {"role": "assistant", "content": "Identify stretch goals and document them"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.031."}, {"role": "assistant", "content": "Identify stretch goals and document them"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.032? (Ex3)"}, {"role": "assistant", "content": "Calculate, document, and prioritize positive risks alongside negative risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.032."}, {"role": "assistant", "content": "Calculate, document, and prioritize positive risks alongside negative risks"}]} {"messages": [{"role": "user", "content": "What is GV.RR? (Roles, Responsibilities, and Authorities)"}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.RR."}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "What does GV.RR cover?"}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01?"}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-01."}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-01?"}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.033? (Ex1)"}, {"role": "assistant", "content": "Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.033."}, {"role": "assistant", "content": "Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.034? (Ex2)"}, {"role": "assistant", "content": "Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.034."}, {"role": "assistant", "content": "Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.035? (Ex3)"}, {"role": "assistant", "content": "Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.035."}, {"role": "assistant", "content": "Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.036? (Ex4)"}, {"role": "assistant", "content": "Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.036."}, {"role": "assistant", "content": "Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02?"}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-02."}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-02?"}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.037? (Ex1)"}, {"role": "assistant", "content": "Document risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.037."}, {"role": "assistant", "content": "Document risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.038? (Ex2)"}, {"role": "assistant", "content": "Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.038."}, {"role": "assistant", "content": "Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.039? (Ex3)"}, {"role": "assistant", "content": "Include cybersecurity responsibilities and performance requirements in personnel descriptions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.039."}, {"role": "assistant", "content": "Include cybersecurity responsibilities and performance requirements in personnel descriptions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.040? (Ex4)"}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.040."}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.041? (Ex5)"}, {"role": "assistant", "content": "Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.041."}, {"role": "assistant", "content": "Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03?"}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-03."}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-03?"}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.042? (Ex1)"}, {"role": "assistant", "content": "Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.042."}, {"role": "assistant", "content": "Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.043? (Ex2)"}, {"role": "assistant", "content": "Identify resource allocation and investment in line with risk tolerance and response"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.043."}, {"role": "assistant", "content": "Identify resource allocation and investment in line with risk tolerance and response"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.044? (Ex3)"}, {"role": "assistant", "content": "Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.044."}, {"role": "assistant", "content": "Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-04."}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-04?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.045? (Ex1)"}, {"role": "assistant", "content": "Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.045."}, {"role": "assistant", "content": "Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.046? (Ex2)"}, {"role": "assistant", "content": "Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.046."}, {"role": "assistant", "content": "Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.047? (Ex3)"}, {"role": "assistant", "content": "Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.047."}, {"role": "assistant", "content": "Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.048? (Ex4)"}, {"role": "assistant", "content": "Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.048."}, {"role": "assistant", "content": "Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles"}]} {"messages": [{"role": "user", "content": "What is GV.PO? (Policy)"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.PO."}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "What does GV.PO cover?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.PO-01."}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.PO-01?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.049? (Ex1)"}, {"role": "assistant", "content": "Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.049."}, {"role": "assistant", "content": "Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.050? (Ex2)"}, {"role": "assistant", "content": "Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.050."}, {"role": "assistant", "content": "Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.051? (Ex3)"}, {"role": "assistant", "content": "Require approval from senior management on policy"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.051."}, {"role": "assistant", "content": "Require approval from senior management on policy"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.052? (Ex4)"}, {"role": "assistant", "content": "Communicate cybersecurity risk management policy and supporting processes and procedures across the organization"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.052."}, {"role": "assistant", "content": "Communicate cybersecurity risk management policy and supporting processes and procedures across the organization"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.053? (Ex5)"}, {"role": "assistant", "content": "Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.053."}, {"role": "assistant", "content": "Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.PO-02."}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.PO-02?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.054? (Ex1)"}, {"role": "assistant", "content": "Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.054."}, {"role": "assistant", "content": "Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.055? (Ex2)"}, {"role": "assistant", "content": "Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.055."}, {"role": "assistant", "content": "Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.056? (Ex3)"}, {"role": "assistant", "content": "Update policy to reflect changes in legal and regulatory requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.056."}, {"role": "assistant", "content": "Update policy to reflect changes in legal and regulatory requirements"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.057? (Ex4)"}, {"role": "assistant", "content": "Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.057."}, {"role": "assistant", "content": "Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)"}]} {"messages": [{"role": "user", "content": "What is GV.OV? (Oversight)"}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.OV."}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "What does GV.OV cover?"}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01?"}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-01."}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-01?"}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01.058? (Ex1)"}, {"role": "assistant", "content": "Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-01.058."}, {"role": "assistant", "content": "Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01.059? (Ex2)"}, {"role": "assistant", "content": "Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-01.059."}, {"role": "assistant", "content": "Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02?"}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-02."}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-02?"}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.060? (Ex1)"}, {"role": "assistant", "content": "Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.060."}, {"role": "assistant", "content": "Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.061? (Ex2)"}, {"role": "assistant", "content": "Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.061."}, {"role": "assistant", "content": "Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.062? (Ex3)"}, {"role": "assistant", "content": "Review strategy in light of cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.062."}, {"role": "assistant", "content": "Review strategy in light of cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03?"}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-03."}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-03?"}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.063? (Ex1)"}, {"role": "assistant", "content": "Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.063."}, {"role": "assistant", "content": "Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.064? (Ex2)"}, {"role": "assistant", "content": "Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.064."}, {"role": "assistant", "content": "Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.065? (Ex3)"}, {"role": "assistant", "content": "Collect and communicate metrics on cybersecurity risk management with senior leadership"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.065."}, {"role": "assistant", "content": "Collect and communicate metrics on cybersecurity risk management with senior leadership"}]} {"messages": [{"role": "user", "content": "What is GV.SC? (Cybersecurity Supply Chain Risk Management)"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.SC."}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What does GV.SC cover?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01?"}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-01."}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-01?"}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.066? (Ex1)"}, {"role": "assistant", "content": "Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.066."}, {"role": "assistant", "content": "Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.067? (Ex2)"}, {"role": "assistant", "content": "Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.067."}, {"role": "assistant", "content": "Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.068? (Ex3)"}, {"role": "assistant", "content": "Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.068."}, {"role": "assistant", "content": "Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.069? (Ex4)"}, {"role": "assistant", "content": "Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.069."}, {"role": "assistant", "content": "Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-02."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.070? (Ex1)"}, {"role": "assistant", "content": "Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.070."}, {"role": "assistant", "content": "Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.071? (Ex2)"}, {"role": "assistant", "content": "Document cybersecurity supply chain risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.071."}, {"role": "assistant", "content": "Document cybersecurity supply chain risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.072? (Ex3)"}, {"role": "assistant", "content": "Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.072."}, {"role": "assistant", "content": "Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.073? (Ex4)"}, {"role": "assistant", "content": "Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.073."}, {"role": "assistant", "content": "Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.074? (Ex5)"}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.074."}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.075? (Ex6)"}, {"role": "assistant", "content": "Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.075."}, {"role": "assistant", "content": "Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.076? (Ex7)"}, {"role": "assistant", "content": "Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.076."}, {"role": "assistant", "content": "Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.077? (Ex8)"}, {"role": "assistant", "content": "Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.077."}, {"role": "assistant", "content": "Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-03."}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-03?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.078? (Ex1)"}, {"role": "assistant", "content": "Identify areas of alignment and overlap with cybersecurity and enterprise risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.078."}, {"role": "assistant", "content": "Identify areas of alignment and overlap with cybersecurity and enterprise risk management"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.079? (Ex2)"}, {"role": "assistant", "content": "Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.079."}, {"role": "assistant", "content": "Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.080? (Ex3)"}, {"role": "assistant", "content": "Integrate cybersecurity supply chain risk management into improvement processes"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.080."}, {"role": "assistant", "content": "Integrate cybersecurity supply chain risk management into improvement processes"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.081? (Ex4)"}, {"role": "assistant", "content": "Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.081."}, {"role": "assistant", "content": "Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04?"}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-04."}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-04?"}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04.082? (Ex1)"}, {"role": "assistant", "content": "Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-04.082."}, {"role": "assistant", "content": "Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04.083? (Ex2)"}, {"role": "assistant", "content": "Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-04.083."}, {"role": "assistant", "content": "Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05?"}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-05."}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-05?"}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.084? (Ex1)"}, {"role": "assistant", "content": "Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.084."}, {"role": "assistant", "content": "Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.085? (Ex2)"}, {"role": "assistant", "content": "Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.085."}, {"role": "assistant", "content": "Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.086? (Ex3)"}, {"role": "assistant", "content": "Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.086."}, {"role": "assistant", "content": "Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.087? (Ex4)"}, {"role": "assistant", "content": "Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.087."}, {"role": "assistant", "content": "Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.088? (Ex5)"}, {"role": "assistant", "content": "Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.088."}, {"role": "assistant", "content": "Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.089? (Ex6)"}, {"role": "assistant", "content": "Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.089."}, {"role": "assistant", "content": "Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.090? (Ex7)"}, {"role": "assistant", "content": "Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.090."}, {"role": "assistant", "content": "Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.091? (Ex8)"}, {"role": "assistant", "content": "Contractually require suppliers to vet their employees and guard against insider threats"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.091."}, {"role": "assistant", "content": "Contractually require suppliers to vet their employees and guard against insider threats"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.092? (Ex9)"}, {"role": "assistant", "content": "Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.092."}, {"role": "assistant", "content": "Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.093? (Ex10)"}, {"role": "assistant", "content": "Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.093."}, {"role": "assistant", "content": "Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06?"}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-06."}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-06?"}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.094? (Ex1)"}, {"role": "assistant", "content": "Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.094."}, {"role": "assistant", "content": "Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.095? (Ex2)"}, {"role": "assistant", "content": "Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.095."}, {"role": "assistant", "content": "Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.096? (Ex3)"}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.096."}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.097? (Ex4)"}, {"role": "assistant", "content": "Assess the authenticity, integrity, and security of critical products prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.097."}, {"role": "assistant", "content": "Assess the authenticity, integrity, and security of critical products prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07?"}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-07."}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-07?"}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.098? (Ex1)"}, {"role": "assistant", "content": "Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.098."}, {"role": "assistant", "content": "Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.099? (Ex2)"}, {"role": "assistant", "content": "Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.099."}, {"role": "assistant", "content": "Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.100? (Ex3)"}, {"role": "assistant", "content": "Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.100."}, {"role": "assistant", "content": "Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.101? (Ex4)"}, {"role": "assistant", "content": "Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.101."}, {"role": "assistant", "content": "Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.102? (Ex5)"}, {"role": "assistant", "content": "Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.102."}, {"role": "assistant", "content": "Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08?"}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-08."}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-08?"}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.103? (Ex1)"}, {"role": "assistant", "content": "Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.103."}, {"role": "assistant", "content": "Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.104? (Ex2)"}, {"role": "assistant", "content": "Identify and document the roles and responsibilities of the organization and its suppliers for incident response"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.104."}, {"role": "assistant", "content": "Identify and document the roles and responsibilities of the organization and its suppliers for incident response"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.105? (Ex3)"}, {"role": "assistant", "content": "Include critical suppliers in incident response exercises and simulations"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.105."}, {"role": "assistant", "content": "Include critical suppliers in incident response exercises and simulations"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.106? (Ex4)"}, {"role": "assistant", "content": "Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.106."}, {"role": "assistant", "content": "Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.107? (Ex5)"}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.107."}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with critical suppliers"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09?"}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-09."}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-09?"}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.108? (Ex1)"}, {"role": "assistant", "content": "Policies and procedures require provenance records for all acquired technology products and services"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.108."}, {"role": "assistant", "content": "Policies and procedures require provenance records for all acquired technology products and services"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.109? (Ex2)"}, {"role": "assistant", "content": "Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.109."}, {"role": "assistant", "content": "Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.110? (Ex3)"}, {"role": "assistant", "content": "Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.110."}, {"role": "assistant", "content": "Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.111? (Ex4)"}, {"role": "assistant", "content": "Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.111."}, {"role": "assistant", "content": "Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.112? (Ex5)"}, {"role": "assistant", "content": "Policies and procedure require checking upgrades to critical hardware for unauthorized changes"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.112."}, {"role": "assistant", "content": "Policies and procedure require checking upgrades to critical hardware for unauthorized changes"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-10."}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-10?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.113? (Ex1)"}, {"role": "assistant", "content": "Establish processes for terminating critical relationships under both normal and adverse circumstances"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.113."}, {"role": "assistant", "content": "Establish processes for terminating critical relationships under both normal and adverse circumstances"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.114? (Ex2)"}, {"role": "assistant", "content": "Define and implement plans for component end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.114."}, {"role": "assistant", "content": "Define and implement plans for component end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.115? (Ex3)"}, {"role": "assistant", "content": "Verify that supplier access to organization resources is deactivated promptly when it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.115."}, {"role": "assistant", "content": "Verify that supplier access to organization resources is deactivated promptly when it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.116? (Ex4)"}, {"role": "assistant", "content": "Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.116."}, {"role": "assistant", "content": "Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.117? (Ex5)"}, {"role": "assistant", "content": "Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.117."}, {"role": "assistant", "content": "Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.118? (Ex6)"}, {"role": "assistant", "content": "Mitigate risks to data and systems created by supplier termination"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.118."}, {"role": "assistant", "content": "Mitigate risks to data and systems created by supplier termination"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.119? (Ex7)"}, {"role": "assistant", "content": "Manage data leakage risks associated with supplier termination"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.119."}, {"role": "assistant", "content": "Manage data leakage risks associated with supplier termination"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID? (IDENTIFY)"}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID."}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "What does ID cover?"}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "What is ID.AM? (Asset Management)"}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.AM."}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "What does ID.AM cover?"}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01?"}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-01."}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-01?"}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01.120? (Ex1)"}, {"role": "assistant", "content": "Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-01.120."}, {"role": "assistant", "content": "Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01.121? (Ex2)"}, {"role": "assistant", "content": "Constantly monitor networks to detect new hardware and automatically update inventories"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-01.121."}, {"role": "assistant", "content": "Constantly monitor networks to detect new hardware and automatically update inventories"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02?"}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-02."}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-02?"}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.122? (Ex1)"}, {"role": "assistant", "content": "Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.122."}, {"role": "assistant", "content": "Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.123? (Ex2)"}, {"role": "assistant", "content": "Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.123."}, {"role": "assistant", "content": "Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.124? (Ex3)"}, {"role": "assistant", "content": "Maintain an inventory of the organization's systems"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.124."}, {"role": "assistant", "content": "Maintain an inventory of the organization's systems"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03?"}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-03."}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-03?"}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.125? (Ex1)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows within the organization's wired and wireless networks"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.125."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows within the organization's wired and wireless networks"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.126? (Ex2)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows between the organization and third parties"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.126."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows between the organization and third parties"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.127? (Ex3)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.127."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.128? (Ex4)"}, {"role": "assistant", "content": "Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.128."}, {"role": "assistant", "content": "Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04?"}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-04."}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-04?"}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04.129? (Ex1)"}, {"role": "assistant", "content": "Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-04.129."}, {"role": "assistant", "content": "Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04.130? (Ex2)"}, {"role": "assistant", "content": "Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-04.130."}, {"role": "assistant", "content": "Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05?"}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-05."}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-05?"}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.131? (Ex1)"}, {"role": "assistant", "content": "Define criteria for prioritizing each class of assets"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.131."}, {"role": "assistant", "content": "Define criteria for prioritizing each class of assets"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.132? (Ex2)"}, {"role": "assistant", "content": "Apply the prioritization criteria to assets"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.132."}, {"role": "assistant", "content": "Apply the prioritization criteria to assets"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.133? (Ex3)"}, {"role": "assistant", "content": "Track the asset priorities and update them periodically or when significant changes to the organization occur"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.133."}, {"role": "assistant", "content": "Track the asset priorities and update them periodically or when significant changes to the organization occur"}]} {"messages": [{"role": "user", "content": "What is ID.AM-06?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-06."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-06?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "What is WR-ID.AM-06?"}, {"role": "assistant", "content": "Incorporated into GV.RR-02, GV.SC-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.AM-06."}, {"role": "assistant", "content": "Incorporated into GV.RR-02, GV.SC-02"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07?"}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-07."}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-07?"}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.134? (Ex1)"}, {"role": "assistant", "content": "Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.134."}, {"role": "assistant", "content": "Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.135? (Ex2)"}, {"role": "assistant", "content": "Continuously discover and analyze ad hoc data to identify new instances of designated data types"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.135."}, {"role": "assistant", "content": "Continuously discover and analyze ad hoc data to identify new instances of designated data types"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.136? (Ex3)"}, {"role": "assistant", "content": "Assign data classifications to designated data types through tags or labels"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.136."}, {"role": "assistant", "content": "Assign data classifications to designated data types through tags or labels"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.137? (Ex4)"}, {"role": "assistant", "content": "Track the provenance, data owner, and geolocation of each instance of designated data types"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.137."}, {"role": "assistant", "content": "Track the provenance, data owner, and geolocation of each instance of designated data types"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08?"}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-08."}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-08?"}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.138? (Ex1)"}, {"role": "assistant", "content": "Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.138."}, {"role": "assistant", "content": "Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.139? (Ex2)"}, {"role": "assistant", "content": "Integrate cybersecurity considerations into product life cycles"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.139."}, {"role": "assistant", "content": "Integrate cybersecurity considerations into product life cycles"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.140? (Ex3)"}, {"role": "assistant", "content": "Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.140."}, {"role": "assistant", "content": "Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.141? (Ex4)"}, {"role": "assistant", "content": "Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.141."}, {"role": "assistant", "content": "Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.142? (Ex5)"}, {"role": "assistant", "content": "Properly configure and secure systems, hardware, software, and services prior to their deployment in production"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.142."}, {"role": "assistant", "content": "Properly configure and secure systems, hardware, software, and services prior to their deployment in production"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.143? (Ex6)"}, {"role": "assistant", "content": "Update inventories when systems, hardware, software, and services are moved or transferred within the organization"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.143."}, {"role": "assistant", "content": "Update inventories when systems, hardware, software, and services are moved or transferred within the organization"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.144? (Ex7)"}, {"role": "assistant", "content": "Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.144."}, {"role": "assistant", "content": "Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.145? (Ex8)"}, {"role": "assistant", "content": "Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.145."}, {"role": "assistant", "content": "Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.146? (Ex9)"}, {"role": "assistant", "content": "Offer methods for destroying paper, storage media, and other physical forms of data storage"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.146."}, {"role": "assistant", "content": "Offer methods for destroying paper, storage media, and other physical forms of data storage"}]} {"messages": [{"role": "user", "content": "What is ID.RA? (Risk Assessment)"}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.RA."}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "What does ID.RA cover?"}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01?"}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-01."}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-01?"}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.147? (Ex1)"}, {"role": "assistant", "content": "Use vulnerability management technologies to identify unpatched and misconfigured software"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.147."}, {"role": "assistant", "content": "Use vulnerability management technologies to identify unpatched and misconfigured software"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.148? (Ex2)"}, {"role": "assistant", "content": "Assess network and system architectures for design and implementation weaknesses that affect cybersecurity"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.148."}, {"role": "assistant", "content": "Assess network and system architectures for design and implementation weaknesses that affect cybersecurity"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.149? (Ex3)"}, {"role": "assistant", "content": "Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.149."}, {"role": "assistant", "content": "Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.150? (Ex4)"}, {"role": "assistant", "content": "Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.150."}, {"role": "assistant", "content": "Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.151? (Ex5)"}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.151."}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.152? (Ex6)"}, {"role": "assistant", "content": "Review processes and procedures for weaknesses that could be exploited to affect cybersecurity"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.152."}, {"role": "assistant", "content": "Review processes and procedures for weaknesses that could be exploited to affect cybersecurity"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02?"}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-02."}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-02?"}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.153? (Ex1)"}, {"role": "assistant", "content": "Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.153."}, {"role": "assistant", "content": "Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.154? (Ex2)"}, {"role": "assistant", "content": "Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.154."}, {"role": "assistant", "content": "Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.155? (Ex3)"}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.155."}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03?"}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-03."}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-03?"}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.156? (Ex1)"}, {"role": "assistant", "content": "Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.156."}, {"role": "assistant", "content": "Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.157? (Ex2)"}, {"role": "assistant", "content": "Perform threat hunting to look for signs of threat actors within the environment"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.157."}, {"role": "assistant", "content": "Perform threat hunting to look for signs of threat actors within the environment"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.158? (Ex3)"}, {"role": "assistant", "content": "Implement processes for identifying internal threat actors"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.158."}, {"role": "assistant", "content": "Implement processes for identifying internal threat actors"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04?"}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-04."}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-04?"}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.159? (Ex1)"}, {"role": "assistant", "content": "Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.159."}, {"role": "assistant", "content": "Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.160? (Ex2)"}, {"role": "assistant", "content": "Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.160."}, {"role": "assistant", "content": "Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.161? (Ex3)"}, {"role": "assistant", "content": "Account for the potential impacts of cascading failures for systems of systems"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.161."}, {"role": "assistant", "content": "Account for the potential impacts of cascading failures for systems of systems"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05?"}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-05."}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-05?"}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05.162? (Ex1)"}, {"role": "assistant", "content": "Develop threat models to better understand risks to the data and identify appropriate risk responses"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-05.162."}, {"role": "assistant", "content": "Develop threat models to better understand risks to the data and identify appropriate risk responses"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05.163? (Ex2)"}, {"role": "assistant", "content": "Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-05.163."}, {"role": "assistant", "content": "Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06?"}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-06."}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-06?"}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.164? (Ex1)"}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.164."}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.165? (Ex2)"}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.165."}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.166? (Ex3)"}, {"role": "assistant", "content": "Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.166."}, {"role": "assistant", "content": "Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.167? (Ex4)"}, {"role": "assistant", "content": "Use risk assessment findings to inform risk response decisions and actions"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.167."}, {"role": "assistant", "content": "Use risk assessment findings to inform risk response decisions and actions"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.168? (Ex5)"}, {"role": "assistant", "content": "Communicate planned risk responses to affected stakeholders in priority order"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.168."}, {"role": "assistant", "content": "Communicate planned risk responses to affected stakeholders in priority order"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07?"}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-07."}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-07?"}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.169? (Ex1)"}, {"role": "assistant", "content": "Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.169."}, {"role": "assistant", "content": "Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.170? (Ex2)"}, {"role": "assistant", "content": "Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.170."}, {"role": "assistant", "content": "Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.171? (Ex3)"}, {"role": "assistant", "content": "Document the risks related to each requested exception and the plan for responding to those risks"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.171."}, {"role": "assistant", "content": "Document the risks related to each requested exception and the plan for responding to those risks"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.172? (Ex4)"}, {"role": "assistant", "content": "Periodically review risks that were accepted based upon planned future actions or milestones"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.172."}, {"role": "assistant", "content": "Periodically review risks that were accepted based upon planned future actions or milestones"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08?"}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-08."}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-08?"}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08.173? (Ex1)"}, {"role": "assistant", "content": "Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-08.173."}, {"role": "assistant", "content": "Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08.174? (Ex2)"}, {"role": "assistant", "content": "Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-08.174."}, {"role": "assistant", "content": "Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations"}]} {"messages": [{"role": "user", "content": "What is ID.RA-09?"}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-09."}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-09?"}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is ID.RA-09.175? (Ex1)"}, {"role": "assistant", "content": "Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-09.175."}, {"role": "assistant", "content": "Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-10?"}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-10."}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-10?"}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "What is ID.RA-10.176? (Ex1)"}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-10.176."}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain"}]} {"messages": [{"role": "user", "content": "What is ID.IM? (Improvement)"}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.IM."}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "What does ID.IM cover?"}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01?"}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-01."}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-01?"}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.177? (Ex1)"}, {"role": "assistant", "content": "Perform self-assessments of critical services that take current threats and TTPs into consideration"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.177."}, {"role": "assistant", "content": "Perform self-assessments of critical services that take current threats and TTPs into consideration"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.178? (Ex2)"}, {"role": "assistant", "content": "Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.178."}, {"role": "assistant", "content": "Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.179? (Ex3)"}, {"role": "assistant", "content": "Constantly evaluate compliance with selected cybersecurity requirements through automated means"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.179."}, {"role": "assistant", "content": "Constantly evaluate compliance with selected cybersecurity requirements through automated means"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02?"}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-02."}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-02?"}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.180? (Ex1)"}, {"role": "assistant", "content": "Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.180."}, {"role": "assistant", "content": "Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.181? (Ex2)"}, {"role": "assistant", "content": "Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.181."}, {"role": "assistant", "content": "Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.182? (Ex3)"}, {"role": "assistant", "content": "Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.182."}, {"role": "assistant", "content": "Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.183? (Ex4)"}, {"role": "assistant", "content": "Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.183."}, {"role": "assistant", "content": "Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.184? (Ex5)"}, {"role": "assistant", "content": "Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.184."}, {"role": "assistant", "content": "Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.185? (Ex6)"}, {"role": "assistant", "content": "Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.185."}, {"role": "assistant", "content": "Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03?"}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-03."}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-03?"}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.186? (Ex1)"}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with suppliers"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.186."}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with suppliers"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.187? (Ex2)"}, {"role": "assistant", "content": "Annually review cybersecurity policies, processes, and procedures to take lessons learned into account"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.187."}, {"role": "assistant", "content": "Annually review cybersecurity policies, processes, and procedures to take lessons learned into account"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.188? (Ex3)"}, {"role": "assistant", "content": "Use metrics to assess operational cybersecurity performance over time"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.188."}, {"role": "assistant", "content": "Use metrics to assess operational cybersecurity performance over time"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04?"}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-04."}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-04?"}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.189? (Ex1)"}, {"role": "assistant", "content": "Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.189."}, {"role": "assistant", "content": "Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.190? (Ex2)"}, {"role": "assistant", "content": "Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.190."}, {"role": "assistant", "content": "Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.191? (Ex3)"}, {"role": "assistant", "content": "Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.191."}, {"role": "assistant", "content": "Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.192? (Ex4)"}, {"role": "assistant", "content": "Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.192."}, {"role": "assistant", "content": "Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.193? (Ex5)"}, {"role": "assistant", "content": "Review and update all cybersecurity plans annually or when a need for significant improvements is identified"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.193."}, {"role": "assistant", "content": "Review and update all cybersecurity plans annually or when a need for significant improvements is identified"}]} {"messages": [{"role": "user", "content": "What is ID.BE-01?"}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-01."}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-01?"}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-01?"}, {"role": "assistant", "content": "Incorporated into GV.OC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-01."}, {"role": "assistant", "content": "Incorporated into GV.OC-05"}]} {"messages": [{"role": "user", "content": "What is ID.BE-02?"}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-02."}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-02?"}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "What is ID.BE-03?"}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-03."}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-03?"}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-03?"}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-03."}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "What is ID.BE-04?"}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-04."}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-04?"}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-04?"}, {"role": "assistant", "content": "Incorporated into GV.OC-04, GV.OC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-04."}, {"role": "assistant", "content": "Incorporated into GV.OC-04, GV.OC-05"}]} {"messages": [{"role": "user", "content": "What is ID.BE-05?"}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-05."}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-05?"}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-05?"}, {"role": "assistant", "content": "Incorporated into GV.OC-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-05."}, {"role": "assistant", "content": "Incorporated into GV.OC-04"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE?"}, {"role": "assistant", "content": "Incorporated into GV.OC"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE."}, {"role": "assistant", "content": "Incorporated into GV.OC"}]} {"messages": [{"role": "user", "content": "What is ID.GV-01?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-01."}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-01?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-01?"}, {"role": "assistant", "content": "Incorporated into GV.PO, GV.PO-01, GV.PO-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-01."}, {"role": "assistant", "content": "Incorporated into GV.PO, GV.PO-01, GV.PO-02"}]} {"messages": [{"role": "user", "content": "What is ID.GV-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-02."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.RR, GV.RR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.RR, GV.RR-02"}]} {"messages": [{"role": "user", "content": "What is ID.GV-03?"}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-03."}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-03?"}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-03?"}, {"role": "assistant", "content": "Moved to GV.OC-03"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-03."}, {"role": "assistant", "content": "Moved to GV.OC-03"}]} {"messages": [{"role": "user", "content": "What is ID.GV-04?"}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-04."}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-04?"}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-04?"}, {"role": "assistant", "content": "Moved to GV.RM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-04."}, {"role": "assistant", "content": "Moved to GV.RM-04"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV?"}, {"role": "assistant", "content": "Incorporated into GV"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV."}, {"role": "assistant", "content": "Incorporated into GV"}]} {"messages": [{"role": "user", "content": "What is ID.RM-01?"}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-01."}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-01?"}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-01?"}, {"role": "assistant", "content": "Incorporated into GV.RM-01, GV.RM-06, GV.RR-03"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-01."}, {"role": "assistant", "content": "Incorporated into GV.RM-01, GV.RM-06, GV.RR-03"}]} {"messages": [{"role": "user", "content": "What is ID.RM-02?"}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-02."}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-02?"}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-02?"}, {"role": "assistant", "content": "Incorporated into GV.RM-02, GV.RM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-02."}, {"role": "assistant", "content": "Incorporated into GV.RM-02, GV.RM-04"}]} {"messages": [{"role": "user", "content": "What is ID.RM-03?"}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-03."}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-03?"}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-03?"}, {"role": "assistant", "content": "Moved into GV.RM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-03."}, {"role": "assistant", "content": "Moved into GV.RM-02"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM?"}, {"role": "assistant", "content": "Incorporated into GV.RM"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM."}, {"role": "assistant", "content": "Incorporated into GV.RM"}]} {"messages": [{"role": "user", "content": "What is ID.SC-01?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-01."}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-01?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-01?"}, {"role": "assistant", "content": "Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-01."}, {"role": "assistant", "content": "Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-02?"}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-02."}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-02?"}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-03?"}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-03."}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-03?"}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-03?"}, {"role": "assistant", "content": "Moved to GV.SC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-03."}, {"role": "assistant", "content": "Moved to GV.SC-05"}]} {"messages": [{"role": "user", "content": "What is ID.SC-04?"}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-04."}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-04?"}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-04?"}, {"role": "assistant", "content": "Incorporated into GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-04."}, {"role": "assistant", "content": "Incorporated into GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-05?"}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-05."}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-05?"}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-05?"}, {"role": "assistant", "content": "Incorporated into GV.SC-08, ID.IM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-05."}, {"role": "assistant", "content": "Incorporated into GV.SC-08, ID.IM-02"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC?"}, {"role": "assistant", "content": "Incorporated into GV.SC"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC."}, {"role": "assistant", "content": "Incorporated into GV.SC"}]} {"messages": [{"role": "user", "content": "What is PR? (PROTECT)"}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR."}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "What does PR cover?"}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "What is PR.AA? (Identity Management, Authentication, and Access Control)"}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.AA."}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "What does PR.AA cover?"}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01?"}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-01."}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-01?"}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.194? (Ex1)"}, {"role": "assistant", "content": "Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.194."}, {"role": "assistant", "content": "Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.195? (Ex2)"}, {"role": "assistant", "content": "Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.195."}, {"role": "assistant", "content": "Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.196? (Ex3)"}, {"role": "assistant", "content": "Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.196."}, {"role": "assistant", "content": "Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.197? (Ex4)"}, {"role": "assistant", "content": "Physically label authorized hardware with an identifier for inventory and servicing purposes"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.197."}, {"role": "assistant", "content": "Physically label authorized hardware with an identifier for inventory and servicing purposes"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-02."}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-02?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02.198? (Ex1)"}, {"role": "assistant", "content": "Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-02.198."}, {"role": "assistant", "content": "Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02.199? (Ex2)"}, {"role": "assistant", "content": "Issue a different credential for each person (i.e., no credential sharing)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-02.199."}, {"role": "assistant", "content": "Issue a different credential for each person (i.e., no credential sharing)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03?"}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-03."}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-03?"}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.200? (Ex1)"}, {"role": "assistant", "content": "Require multifactor authentication"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.200."}, {"role": "assistant", "content": "Require multifactor authentication"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.201? (Ex2)"}, {"role": "assistant", "content": "Enforce policies for the minimum strength of passwords, PINs, and similar authenticators"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.201."}, {"role": "assistant", "content": "Enforce policies for the minimum strength of passwords, PINs, and similar authenticators"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.202? (Ex3)"}, {"role": "assistant", "content": "Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.202."}, {"role": "assistant", "content": "Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.203? (Ex4)"}, {"role": "assistant", "content": "Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.203."}, {"role": "assistant", "content": "Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04?"}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-04."}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-04?"}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.204? (Ex1)"}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information through single sign-on systems"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.204."}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information through single sign-on systems"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.205? (Ex2)"}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information between federated systems"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.205."}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information between federated systems"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.206? (Ex3)"}, {"role": "assistant", "content": "Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.206."}, {"role": "assistant", "content": "Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05?"}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-05."}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-05?"}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.207? (Ex1)"}, {"role": "assistant", "content": "Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.207."}, {"role": "assistant", "content": "Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.208? (Ex2)"}, {"role": "assistant", "content": "Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.208."}, {"role": "assistant", "content": "Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.209? (Ex3)"}, {"role": "assistant", "content": "Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.209."}, {"role": "assistant", "content": "Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.210? (Ex4)"}, {"role": "assistant", "content": "Periodically review the privileges associated with critical business functions to confirm proper separation of duties"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.210."}, {"role": "assistant", "content": "Periodically review the privileges associated with critical business functions to confirm proper separation of duties"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06?"}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-06."}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-06?"}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.211? (Ex1)"}, {"role": "assistant", "content": "Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.211."}, {"role": "assistant", "content": "Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.212? (Ex2)"}, {"role": "assistant", "content": "Employ additional physical security controls for areas that contain high-risk assets"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.212."}, {"role": "assistant", "content": "Employ additional physical security controls for areas that contain high-risk assets"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.213? (Ex3)"}, {"role": "assistant", "content": "Escort guests, vendors, and other third parties within areas that contain business-critical assets"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.213."}, {"role": "assistant", "content": "Escort guests, vendors, and other third parties within areas that contain business-critical assets"}]} {"messages": [{"role": "user", "content": "What is PR.AT? (Awareness and Training)"}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.AT."}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "What does PR.AT cover?"}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01?"}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-01."}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-01?"}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.214? (Ex1)"}, {"role": "assistant", "content": "Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.214."}, {"role": "assistant", "content": "Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.215? (Ex2)"}, {"role": "assistant", "content": "Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.215."}, {"role": "assistant", "content": "Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.216? (Ex3)"}, {"role": "assistant", "content": "Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.216."}, {"role": "assistant", "content": "Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.217? (Ex4)"}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of basic cybersecurity practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.217."}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of basic cybersecurity practices"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.218? (Ex5)"}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.218."}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02?"}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-02."}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-02?"}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.219? (Ex1)"}, {"role": "assistant", "content": "Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.219."}, {"role": "assistant", "content": "Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.220? (Ex2)"}, {"role": "assistant", "content": "Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.220."}, {"role": "assistant", "content": "Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.221? (Ex3)"}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.221."}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.222? (Ex4)"}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.222."}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "What is PR.AT-03?"}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-03."}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-03?"}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-03?"}, {"role": "assistant", "content": "Incorporated into PR.AT-01, PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-03."}, {"role": "assistant", "content": "Incorporated into PR.AT-01, PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.AT-04?"}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-04."}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-04?"}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-04?"}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-04."}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.AT-05?"}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-05."}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-05?"}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-05?"}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-05."}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.DS? (Data Security)"}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.DS."}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "What does PR.DS cover?"}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-01."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-01?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.223? (Ex1)"}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.223."}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.224? (Ex2)"}, {"role": "assistant", "content": "Use full disk encryption to protect data stored on user endpoints"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.224."}, {"role": "assistant", "content": "Use full disk encryption to protect data stored on user endpoints"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.225? (Ex3)"}, {"role": "assistant", "content": "Confirm the integrity of software by validating signatures"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.225."}, {"role": "assistant", "content": "Confirm the integrity of software by validating signatures"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.226? (Ex4)"}, {"role": "assistant", "content": "Restrict the use of removable media to prevent data exfiltration"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.226."}, {"role": "assistant", "content": "Restrict the use of removable media to prevent data exfiltration"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.227? (Ex5)"}, {"role": "assistant", "content": "Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.227."}, {"role": "assistant", "content": "Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-02."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-02?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.228? (Ex1)"}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.228."}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.229? (Ex2)"}, {"role": "assistant", "content": "Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.229."}, {"role": "assistant", "content": "Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.230? (Ex3)"}, {"role": "assistant", "content": "Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.230."}, {"role": "assistant", "content": "Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.231? (Ex4)"}, {"role": "assistant", "content": "Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.231."}, {"role": "assistant", "content": "Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments"}]} {"messages": [{"role": "user", "content": "What is PR.DS-03?"}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-03."}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-03?"}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-03?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-03."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "What is PR.DS-04?"}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-04."}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-04?"}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-04?"}, {"role": "assistant", "content": "Moved to PR.IR-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-04."}, {"role": "assistant", "content": "Moved to PR.IR-04"}]} {"messages": [{"role": "user", "content": "What is PR.DS-05?"}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-05."}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-05?"}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-05?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.DS-02, PR.DS-10"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-05."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.DS-02, PR.DS-10"}]} {"messages": [{"role": "user", "content": "What is PR.DS-06?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-06."}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-06?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-06?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-06."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is PR.DS-07?"}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-07."}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-07?"}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-07?"}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-07."}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.DS-08?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-08."}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-08?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-08?"}, {"role": "assistant", "content": "Incorporated into ID.RA-09, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-08."}, {"role": "assistant", "content": "Incorporated into ID.RA-09, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-10."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-10?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10.232? (Ex1)"}, {"role": "assistant", "content": "Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-10.232."}, {"role": "assistant", "content": "Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10.233? (Ex2)"}, {"role": "assistant", "content": "Protect data in use from access by other users and processes of the same platform"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-10.233."}, {"role": "assistant", "content": "Protect data in use from access by other users and processes of the same platform"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11?"}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-11."}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-11?"}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.234? (Ex1)"}, {"role": "assistant", "content": "Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.234."}, {"role": "assistant", "content": "Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.235? (Ex2)"}, {"role": "assistant", "content": "Test backups and restores for all types of data sources at least annually"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.235."}, {"role": "assistant", "content": "Test backups and restores for all types of data sources at least annually"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.236? (Ex3)"}, {"role": "assistant", "content": "Securely store some backups offline and offsite so that an incident or disaster will not damage them"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.236."}, {"role": "assistant", "content": "Securely store some backups offline and offsite so that an incident or disaster will not damage them"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.237? (Ex4)"}, {"role": "assistant", "content": "Enforce geographic separation and geolocation restrictions for data backup storage"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.237."}, {"role": "assistant", "content": "Enforce geographic separation and geolocation restrictions for data backup storage"}]} {"messages": [{"role": "user", "content": "What is PR.PS? (Platform Security)"}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.PS."}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "What does PR.PS cover?"}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01?"}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-01."}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-01?"}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.238? (Ex1)"}, {"role": "assistant", "content": "Establish, test, deploy, and maintain hardened baselines that enforce the organization's cybersecurity policies and provide only essential capabilities (i.e., principle of least functionality)"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.238."}, {"role": "assistant", "content": "Establish, test, deploy, and maintain hardened baselines that enforce the organization's cybersecurity policies and provide only essential capabilities (i.e., principle of least functionality)"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.239? (Ex2)"}, {"role": "assistant", "content": "Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.239."}, {"role": "assistant", "content": "Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.240? (Ex3)"}, {"role": "assistant", "content": "Monitor implemented software for deviations from approved baselines"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.240."}, {"role": "assistant", "content": "Monitor implemented software for deviations from approved baselines"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02?"}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-02."}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-02?"}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.241? (Ex1)"}, {"role": "assistant", "content": "Perform routine and emergency patching within the timeframes specified in the vulnerability management plan"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.241."}, {"role": "assistant", "content": "Perform routine and emergency patching within the timeframes specified in the vulnerability management plan"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.242? (Ex2)"}, {"role": "assistant", "content": "Update container images, and deploy new container instances to replace rather than update existing instances"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.242."}, {"role": "assistant", "content": "Update container images, and deploy new container instances to replace rather than update existing instances"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.243? (Ex3)"}, {"role": "assistant", "content": "Replace end-of-life software and service versions with supported, maintained versions"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.243."}, {"role": "assistant", "content": "Replace end-of-life software and service versions with supported, maintained versions"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.244? (Ex4)"}, {"role": "assistant", "content": "Uninstall and remove unauthorized software and services that pose undue risks"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.244."}, {"role": "assistant", "content": "Uninstall and remove unauthorized software and services that pose undue risks"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.245? (Ex5)"}, {"role": "assistant", "content": "Uninstall and remove any unnecessary software components (e.g., operating system utilities) that attackers might misuse"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.245."}, {"role": "assistant", "content": "Uninstall and remove any unnecessary software components (e.g., operating system utilities) that attackers might misuse"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.246? (Ex6)"}, {"role": "assistant", "content": "Define and implement plans for software and service end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.246."}, {"role": "assistant", "content": "Define and implement plans for software and service end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03?"}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-03."}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-03?"}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.247? (Ex1)"}, {"role": "assistant", "content": "Replace hardware when it lacks needed security capabilities or when it cannot support software with needed security capabilities"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.247."}, {"role": "assistant", "content": "Replace hardware when it lacks needed security capabilities or when it cannot support software with needed security capabilities"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.248? (Ex2)"}, {"role": "assistant", "content": "Define and implement plans for hardware end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.248."}, {"role": "assistant", "content": "Define and implement plans for hardware end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.249? (Ex3)"}, {"role": "assistant", "content": "Perform hardware disposal in a secure, responsible, and auditable manner"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.249."}, {"role": "assistant", "content": "Perform hardware disposal in a secure, responsible, and auditable manner"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04?"}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-04."}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-04?"}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.250? (Ex1)"}, {"role": "assistant", "content": "Configure all operating systems, applications, and services (including cloud-based services) to generate log records"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.250."}, {"role": "assistant", "content": "Configure all operating systems, applications, and services (including cloud-based services) to generate log records"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.251? (Ex2)"}, {"role": "assistant", "content": "Configure log generators to securely share their logs with the organization's logging infrastructure systems and services"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.251."}, {"role": "assistant", "content": "Configure log generators to securely share their logs with the organization's logging infrastructure systems and services"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.252? (Ex3)"}, {"role": "assistant", "content": "Configure log generators to record the data needed by zero-trust architectures"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.252."}, {"role": "assistant", "content": "Configure log generators to record the data needed by zero-trust architectures"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05?"}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-05."}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-05?"}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.253? (Ex1)"}, {"role": "assistant", "content": "When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.253."}, {"role": "assistant", "content": "When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.254? (Ex2)"}, {"role": "assistant", "content": "Verify the source of new software and the software's integrity before installing it"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.254."}, {"role": "assistant", "content": "Verify the source of new software and the software's integrity before installing it"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.255? (Ex3)"}, {"role": "assistant", "content": "Configure platforms to use only approved DNS services that block access to known malicious domains"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.255."}, {"role": "assistant", "content": "Configure platforms to use only approved DNS services that block access to known malicious domains"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.256? (Ex4)"}, {"role": "assistant", "content": "Configure platforms to allow the installation of organization-approved software only"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.256."}, {"role": "assistant", "content": "Configure platforms to allow the installation of organization-approved software only"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06?"}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-06."}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-06?"}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.257? (Ex1)"}, {"role": "assistant", "content": "Protect all components of organization-developed software from tampering and unauthorized access"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.257."}, {"role": "assistant", "content": "Protect all components of organization-developed software from tampering and unauthorized access"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.258? (Ex2)"}, {"role": "assistant", "content": "Secure all software produced by the organization, with minimal vulnerabilities in their releases"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.258."}, {"role": "assistant", "content": "Secure all software produced by the organization, with minimal vulnerabilities in their releases"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.259? (Ex3)"}, {"role": "assistant", "content": "Maintain the software used in production environments, and securely dispose of software once it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.259."}, {"role": "assistant", "content": "Maintain the software used in production environments, and securely dispose of software once it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.IR? (Technology Infrastructure Resilience)"}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.IR."}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "What does PR.IR cover?"}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01?"}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-01."}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-01?"}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.260? (Ex1)"}, {"role": "assistant", "content": "Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e.g., IT, IoT, OT, mobile, guests), and permit required communications only between segments"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.260."}, {"role": "assistant", "content": "Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e.g., IT, IoT, OT, mobile, guests), and permit required communications only between segments"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.261? (Ex2)"}, {"role": "assistant", "content": "Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.261."}, {"role": "assistant", "content": "Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.262? (Ex3)"}, {"role": "assistant", "content": "Implement zero trust architectures to restrict network access to each resource to the minimum necessary"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.262."}, {"role": "assistant", "content": "Implement zero trust architectures to restrict network access to each resource to the minimum necessary"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.263? (Ex4)"}, {"role": "assistant", "content": "Check the cyber health of endpoints before allowing them to access and use production resources"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.263."}, {"role": "assistant", "content": "Check the cyber health of endpoints before allowing them to access and use production resources"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02?"}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-02."}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-02?"}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02.264? (Ex1)"}, {"role": "assistant", "content": "Protect organizational equipment from known environmental threats, such as flooding, fire, wind, and excessive heat and humidity"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-02.264."}, {"role": "assistant", "content": "Protect organizational equipment from known environmental threats, such as flooding, fire, wind, and excessive heat and humidity"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02.265? (Ex2)"}, {"role": "assistant", "content": "Include protection from environmental threats and provisions for adequate operating infrastructure in requirements for service providers that operate systems on the organization's behalf"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-02.265."}, {"role": "assistant", "content": "Include protection from environmental threats and provisions for adequate operating infrastructure in requirements for service providers that operate systems on the organization's behalf"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03?"}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-03."}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-03?"}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.266? (Ex1)"}, {"role": "assistant", "content": "Avoid single points of failure in systems and infrastructure"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.266."}, {"role": "assistant", "content": "Avoid single points of failure in systems and infrastructure"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.267? (Ex2)"}, {"role": "assistant", "content": "Use load balancing to increase capacity and improve reliability"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.267."}, {"role": "assistant", "content": "Use load balancing to increase capacity and improve reliability"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.268? (Ex3)"}, {"role": "assistant", "content": "Use high-availability components like redundant storage and power supplies to improve system reliability"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.268."}, {"role": "assistant", "content": "Use high-availability components like redundant storage and power supplies to improve system reliability"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04?"}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-04."}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-04?"}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04.269? (Ex1)"}, {"role": "assistant", "content": "Monitor usage of storage, power, compute, network bandwidth, and other resources"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-04.269."}, {"role": "assistant", "content": "Monitor usage of storage, power, compute, network bandwidth, and other resources"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04.270? (Ex2)"}, {"role": "assistant", "content": "Forecast future needs, and scale resources accordingly"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-04.270."}, {"role": "assistant", "content": "Forecast future needs, and scale resources accordingly"}]} {"messages": [{"role": "user", "content": "What is PR.AC-01?"}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-01."}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-01?"}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-01?"}, {"role": "assistant", "content": "Incorporated into PR.AA-01, PR.AA-05"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-01."}, {"role": "assistant", "content": "Incorporated into PR.AA-01, PR.AA-05"}]} {"messages": [{"role": "user", "content": "What is PR.AC-02?"}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-02."}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-02?"}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-02?"}, {"role": "assistant", "content": "Moved to PR.AA-06"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-02."}, {"role": "assistant", "content": "Moved to PR.AA-06"}]} {"messages": [{"role": "user", "content": "What is PR.AC-03?"}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-03."}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-03?"}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-03?"}, {"role": "assistant", "content": "Incorporated into PR.AA-03, PR.AA-05, PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-03."}, {"role": "assistant", "content": "Incorporated into PR.AA-03, PR.AA-05, PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.AC-04?"}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-04."}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-04?"}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-04?"}, {"role": "assistant", "content": "Moved to PR.AA-05"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-04."}, {"role": "assistant", "content": "Moved to PR.AA-05"}]} {"messages": [{"role": "user", "content": "What is PR.AC-05?"}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-05."}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-05?"}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-05?"}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-05."}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.AC-06?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-06."}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-06?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-06?"}, {"role": "assistant", "content": "Moved to PR.AA-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-06."}, {"role": "assistant", "content": "Moved to PR.AA-02"}]} {"messages": [{"role": "user", "content": "What is PR.AC-07?"}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-07."}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-07?"}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-07?"}, {"role": "assistant", "content": "Moved to PR.AA-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-07."}, {"role": "assistant", "content": "Moved to PR.AA-03"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC?"}, {"role": "assistant", "content": "Moved to PR.AA"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC."}, {"role": "assistant", "content": "Moved to PR.AA"}]} {"messages": [{"role": "user", "content": "What is PR.IP-01?"}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-01."}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-01?"}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-01?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-01."}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.IP-02?"}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-02."}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-02?"}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-02?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-06"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-02."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-06"}]} {"messages": [{"role": "user", "content": "What is PR.IP-03?"}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-03."}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-03?"}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-03?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01, ID.RA-07"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-03."}, {"role": "assistant", "content": "Incorporated into PR.PS-01, ID.RA-07"}]} {"messages": [{"role": "user", "content": "What is PR.IP-04?"}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-04."}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-04?"}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-04?"}, {"role": "assistant", "content": "Moved to PR.DS-11"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-04."}, {"role": "assistant", "content": "Moved to PR.DS-11"}]} {"messages": [{"role": "user", "content": "What is PR.IP-05?"}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-05."}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-05?"}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-05?"}, {"role": "assistant", "content": "Moved to PR.IR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-05."}, {"role": "assistant", "content": "Moved to PR.IR-02"}]} {"messages": [{"role": "user", "content": "What is PR.IP-06?"}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-06."}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-06?"}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-06?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-06."}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "What is PR.IP-07?"}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-07."}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-07?"}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-07?"}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-07."}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is PR.IP-08?"}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-08."}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-08?"}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-08?"}, {"role": "assistant", "content": "Moved to ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-08."}, {"role": "assistant", "content": "Moved to ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is PR.IP-09?"}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-09."}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-09?"}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-09?"}, {"role": "assistant", "content": "Moved to ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-09."}, {"role": "assistant", "content": "Moved to ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-10?"}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-10."}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-10?"}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-10?"}, {"role": "assistant", "content": "Incorporated into ID.IM-02, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-10."}, {"role": "assistant", "content": "Incorporated into ID.IM-02, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-11?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-11."}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-11?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-11?"}, {"role": "assistant", "content": "Moved to GV.RR-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-11."}, {"role": "assistant", "content": "Moved to GV.RR-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-12?"}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-12."}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-12?"}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-12?"}, {"role": "assistant", "content": "Incorporated into ID.RA-01, PR.PS-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-12."}, {"role": "assistant", "content": "Incorporated into ID.RA-01, PR.PS-02"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP?"}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP."}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "What is PR.MA-01?"}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.MA-01."}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.MA-01?"}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA-01?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA-01."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "What is PR.MA-02?"}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.MA-02."}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.MA-02?"}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA-02?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA-02."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-02"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA."}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "What is PR.PT-01?"}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-01."}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-01?"}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-01?"}, {"role": "assistant", "content": "Incorporated into PR.PS-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-01."}, {"role": "assistant", "content": "Incorporated into PR.PS-04"}]} {"messages": [{"role": "user", "content": "What is PR.PT-02?"}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-02."}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-02?"}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-02?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-02."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-03?"}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-03."}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-03?"}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-03?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-03."}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-04?"}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-04."}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-04?"}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-04?"}, {"role": "assistant", "content": "Incorporated into PR.AA-06, PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-04."}, {"role": "assistant", "content": "Incorporated into PR.AA-06, PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-05?"}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-05."}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-05?"}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-05?"}, {"role": "assistant", "content": "Moved to PR.IR-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-05."}, {"role": "assistant", "content": "Moved to PR.IR-03"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT?"}, {"role": "assistant", "content": "Incorporated into other Protect Categories"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT."}, {"role": "assistant", "content": "Incorporated into other Protect Categories"}]} {"messages": [{"role": "user", "content": "What is DE? (DETECT)"}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE."}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "What does DE cover?"}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "What is DE.CM? (Continuous Monitoring)"}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE.CM."}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "What does DE.CM cover?"}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01?"}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-01."}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-01?"}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.271? (Ex1)"}, {"role": "assistant", "content": "Monitor DNS, BGP, and other network services for adverse events"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.271."}, {"role": "assistant", "content": "Monitor DNS, BGP, and other network services for adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.272? (Ex2)"}, {"role": "assistant", "content": "Monitor wired and wireless networks for connections from unauthorized endpoints"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.272."}, {"role": "assistant", "content": "Monitor wired and wireless networks for connections from unauthorized endpoints"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.273? (Ex3)"}, {"role": "assistant", "content": "Monitor facilities for unauthorized or rogue wireless networks"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.273."}, {"role": "assistant", "content": "Monitor facilities for unauthorized or rogue wireless networks"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.274? (Ex4)"}, {"role": "assistant", "content": "Compare actual network flows against baselines to detect deviations"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.274."}, {"role": "assistant", "content": "Compare actual network flows against baselines to detect deviations"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.275? (Ex5)"}, {"role": "assistant", "content": "Monitor network communications to identify changes in security postures for zero trust purposes"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.275."}, {"role": "assistant", "content": "Monitor network communications to identify changes in security postures for zero trust purposes"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02?"}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-02."}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-02?"}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.276? (Ex1)"}, {"role": "assistant", "content": "Monitor logs from physical access control systems (e.g., badge readers) to find unusual access patterns (e.g., deviations from the norm) and failed access attempts"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.276."}, {"role": "assistant", "content": "Monitor logs from physical access control systems (e.g., badge readers) to find unusual access patterns (e.g., deviations from the norm) and failed access attempts"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.277? (Ex2)"}, {"role": "assistant", "content": "Review and monitor physical access records (e.g., from visitor registration, sign-in sheets)"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.277."}, {"role": "assistant", "content": "Review and monitor physical access records (e.g., from visitor registration, sign-in sheets)"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.278? (Ex3)"}, {"role": "assistant", "content": "Monitor physical access controls (e.g., locks, latches, hinge pins, alarms) for signs of tampering"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.278."}, {"role": "assistant", "content": "Monitor physical access controls (e.g., locks, latches, hinge pins, alarms) for signs of tampering"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.279? (Ex4)"}, {"role": "assistant", "content": "Monitor the physical environment using alarm systems, cameras, and security guards"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.279."}, {"role": "assistant", "content": "Monitor the physical environment using alarm systems, cameras, and security guards"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03?"}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-03."}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-03?"}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.280? (Ex1)"}, {"role": "assistant", "content": "Use behavior analytics software to detect anomalous user activity to mitigate insider threats"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.280."}, {"role": "assistant", "content": "Use behavior analytics software to detect anomalous user activity to mitigate insider threats"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.281? (Ex2)"}, {"role": "assistant", "content": "Monitor logs from logical access control systems to find unusual access patterns and failed access attempts"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.281."}, {"role": "assistant", "content": "Monitor logs from logical access control systems to find unusual access patterns and failed access attempts"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.282? (Ex3)"}, {"role": "assistant", "content": "Continuously monitor deception technology, including user accounts, for any usage"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.282."}, {"role": "assistant", "content": "Continuously monitor deception technology, including user accounts, for any usage"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.CM-04?"}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-04."}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-04?"}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-04?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-04."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-05?"}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-05."}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-05?"}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-05?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-05."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06?"}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-06."}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-06?"}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06.283? (Ex1)"}, {"role": "assistant", "content": "Monitor remote and onsite administration and maintenance activities that external providers perform on organizational systems"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-06.283."}, {"role": "assistant", "content": "Monitor remote and onsite administration and maintenance activities that external providers perform on organizational systems"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06.284? (Ex2)"}, {"role": "assistant", "content": "Monitor activity from cloud-based services, internet service providers, and other service providers for deviations from expected behavior"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-06.284."}, {"role": "assistant", "content": "Monitor activity from cloud-based services, internet service providers, and other service providers for deviations from expected behavior"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.CM-07?"}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-07."}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-07?"}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-07?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-07."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-08?"}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-08."}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-08?"}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-08?"}, {"role": "assistant", "content": "Incorporated into ID.RA-01"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-08."}, {"role": "assistant", "content": "Incorporated into ID.RA-01"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09?"}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-09."}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-09?"}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.285? (Ex1)"}, {"role": "assistant", "content": "Monitor email, web, file sharing, collaboration services, and other common attack vectors to detect malware, phishing, data leaks and exfiltration, and other adverse events"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.285."}, {"role": "assistant", "content": "Monitor email, web, file sharing, collaboration services, and other common attack vectors to detect malware, phishing, data leaks and exfiltration, and other adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.286? (Ex2)"}, {"role": "assistant", "content": "Monitor authentication attempts to identify attacks against credentials and unauthorized credential reuse"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.286."}, {"role": "assistant", "content": "Monitor authentication attempts to identify attacks against credentials and unauthorized credential reuse"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.287? (Ex3)"}, {"role": "assistant", "content": "Monitor software configurations for deviations from security baselines"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.287."}, {"role": "assistant", "content": "Monitor software configurations for deviations from security baselines"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.288? (Ex4)"}, {"role": "assistant", "content": "Monitor hardware and software for signs of tampering"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.288."}, {"role": "assistant", "content": "Monitor hardware and software for signs of tampering"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.289? (Ex5)"}, {"role": "assistant", "content": "Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.289."}, {"role": "assistant", "content": "Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE? (Adverse Event Analysis)"}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE.AE."}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What does DE.AE cover?"}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is DE.AE-01?"}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-01."}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-01?"}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.AE-01?"}, {"role": "assistant", "content": "Incorporated into ID.AM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.AE-01."}, {"role": "assistant", "content": "Incorporated into ID.AM-03"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02?"}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-02."}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-02?"}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.290? (Ex1)"}, {"role": "assistant", "content": "Use security information and event management (SIEM) or other tools to continuously monitor log events for known malicious and suspicious activity"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.290."}, {"role": "assistant", "content": "Use security information and event management (SIEM) or other tools to continuously monitor log events for known malicious and suspicious activity"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.291? (Ex2)"}, {"role": "assistant", "content": "Utilize up-to-date cyber threat intelligence in log analysis tools to improve detection accuracy and characterize threat actors, their methods, and indicators of compromise"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.291."}, {"role": "assistant", "content": "Utilize up-to-date cyber threat intelligence in log analysis tools to improve detection accuracy and characterize threat actors, their methods, and indicators of compromise"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.292? (Ex3)"}, {"role": "assistant", "content": "Regularly conduct manual reviews of log events for technologies that cannot be sufficiently monitored through automation"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.292."}, {"role": "assistant", "content": "Regularly conduct manual reviews of log events for technologies that cannot be sufficiently monitored through automation"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.293? (Ex4)"}, {"role": "assistant", "content": "Use log analysis tools to generate reports on their findings"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.293."}, {"role": "assistant", "content": "Use log analysis tools to generate reports on their findings"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03?"}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-03."}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-03?"}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.294? (Ex1)"}, {"role": "assistant", "content": "Constantly transfer log data generated by other sources to a relatively small number of log servers"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.294."}, {"role": "assistant", "content": "Constantly transfer log data generated by other sources to a relatively small number of log servers"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.295? (Ex2)"}, {"role": "assistant", "content": "Use event correlation technology (e.g., SIEM) to collect information captured by multiple sources"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.295."}, {"role": "assistant", "content": "Use event correlation technology (e.g., SIEM) to collect information captured by multiple sources"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.296? (Ex3)"}, {"role": "assistant", "content": "Utilize cyber threat intelligence to help correlate events among log sources"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.296."}, {"role": "assistant", "content": "Utilize cyber threat intelligence to help correlate events among log sources"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04?"}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-04."}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-04?"}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04.297? (Ex1)"}, {"role": "assistant", "content": "Use SIEMs or other tools to estimate impact and scope, and review and refine the estimates"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-04.297."}, {"role": "assistant", "content": "Use SIEMs or other tools to estimate impact and scope, and review and refine the estimates"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04.298? (Ex2)"}, {"role": "assistant", "content": "A person creates their own estimates of impact and scope"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-04.298."}, {"role": "assistant", "content": "A person creates their own estimates of impact and scope"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE-05?"}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-05."}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-05?"}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "What is WR-DE.AE-05?"}, {"role": "assistant", "content": "Moved to DE.AE-08"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.AE-05."}, {"role": "assistant", "content": "Moved to DE.AE-08"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06?"}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-06."}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-06?"}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.299? (Ex1)"}, {"role": "assistant", "content": "Use cybersecurity software to generate alerts and provide them to the security operations center (SOC), incident responders, and incident response tools"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.299."}, {"role": "assistant", "content": "Use cybersecurity software to generate alerts and provide them to the security operations center (SOC), incident responders, and incident response tools"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.300? (Ex2)"}, {"role": "assistant", "content": "Incident responders and other authorized personnel can access log analysis findings at all times"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.300."}, {"role": "assistant", "content": "Incident responders and other authorized personnel can access log analysis findings at all times"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.301? (Ex3)"}, {"role": "assistant", "content": "Automatically create and assign tickets in the organization's ticketing system when certain types of alerts occur"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.301."}, {"role": "assistant", "content": "Automatically create and assign tickets in the organization's ticketing system when certain types of alerts occur"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.302? (Ex4)"}, {"role": "assistant", "content": "Manually create and assign tickets in the organization's ticketing system when technical staff discover indicators of compromise"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.302."}, {"role": "assistant", "content": "Manually create and assign tickets in the organization's ticketing system when technical staff discover indicators of compromise"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07?"}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-07."}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-07?"}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.303? (Ex1)"}, {"role": "assistant", "content": "Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.303."}, {"role": "assistant", "content": "Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.304? (Ex2)"}, {"role": "assistant", "content": "Securely provide information from asset inventories to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.304."}, {"role": "assistant", "content": "Securely provide information from asset inventories to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.305? (Ex3)"}, {"role": "assistant", "content": "Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.305."}, {"role": "assistant", "content": "Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08?"}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-08."}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-08?"}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08.306? (Ex1)"}, {"role": "assistant", "content": "Apply incident criteria to known and assumed characteristics of activity in order to determine whether an incident should be declared"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-08.306."}, {"role": "assistant", "content": "Apply incident criteria to known and assumed characteristics of activity in order to determine whether an incident should be declared"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08.307? (Ex2)"}, {"role": "assistant", "content": "Take known false positives into account when applying incident criteria"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-08.307."}, {"role": "assistant", "content": "Take known false positives into account when applying incident criteria"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is DE.DP-01?"}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-01."}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-01?"}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-01?"}, {"role": "assistant", "content": "Incorporated into GV.RR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-01."}, {"role": "assistant", "content": "Incorporated into GV.RR-02"}]} {"messages": [{"role": "user", "content": "What is DE.DP-02?"}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-02."}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-02?"}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-02?"}, {"role": "assistant", "content": "Incorporated into DE.AE"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-02."}, {"role": "assistant", "content": "Incorporated into DE.AE"}]} {"messages": [{"role": "user", "content": "What is DE.DP-03?"}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-03."}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-03?"}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-03?"}, {"role": "assistant", "content": "Incorporated into ID.IM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-03."}, {"role": "assistant", "content": "Incorporated into ID.IM-02"}]} {"messages": [{"role": "user", "content": "What is DE.DP-04?"}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-04."}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-04?"}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-04?"}, {"role": "assistant", "content": "Incorporated into DE.AE-06"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-04."}, {"role": "assistant", "content": "Incorporated into DE.AE-06"}]} {"messages": [{"role": "user", "content": "What is DE.DP-05?"}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-05."}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-05?"}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-05?"}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-05."}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP?"}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP."}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "What is RS? (RESPOND)"}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS."}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "What does RS cover?"}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "What is RS.MA? (Incident Management)"}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.MA."}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "What does RS.MA cover?"}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01?"}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-01."}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-01?"}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.308? (Ex1)"}, {"role": "assistant", "content": "Detection technologies automatically report confirmed incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.308."}, {"role": "assistant", "content": "Detection technologies automatically report confirmed incidents"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.309? (Ex2)"}, {"role": "assistant", "content": "Request incident response assistance from the organization's incident response outsourcer"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.309."}, {"role": "assistant", "content": "Request incident response assistance from the organization's incident response outsourcer"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.310? (Ex3)"}, {"role": "assistant", "content": "Designate an incident lead for each incident"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.310."}, {"role": "assistant", "content": "Designate an incident lead for each incident"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.311? (Ex4)"}, {"role": "assistant", "content": "Initiate execution of additional cybersecurity plans as needed to support incident response (for example, business continuity and disaster recovery)"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.311."}, {"role": "assistant", "content": "Initiate execution of additional cybersecurity plans as needed to support incident response (for example, business continuity and disaster recovery)"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02?"}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-02."}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-02?"}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02.312? (Ex1)"}, {"role": "assistant", "content": "Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-02.312."}, {"role": "assistant", "content": "Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02.313? (Ex2)"}, {"role": "assistant", "content": "Apply criteria to estimate the severity of an incident"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-02.313."}, {"role": "assistant", "content": "Apply criteria to estimate the severity of an incident"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03?"}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-03."}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-03?"}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.314? (Ex1)"}, {"role": "assistant", "content": "Further review and categorize incidents based on the type of incident (e.g., data breach, ransomware, DDoS, account compromise)"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.314."}, {"role": "assistant", "content": "Further review and categorize incidents based on the type of incident (e.g., data breach, ransomware, DDoS, account compromise)"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.315? (Ex2)"}, {"role": "assistant", "content": "Prioritize incidents based on their scope, likely impact, and time-critical nature"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.315."}, {"role": "assistant", "content": "Prioritize incidents based on their scope, likely impact, and time-critical nature"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.316? (Ex3)"}, {"role": "assistant", "content": "Select incident response strategies for active incidents by balancing the need to quickly recover from an incident with the need to observe the attacker or conduct a more thorough investigation"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.316."}, {"role": "assistant", "content": "Select incident response strategies for active incidents by balancing the need to quickly recover from an incident with the need to observe the attacker or conduct a more thorough investigation"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04?"}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-04."}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-04?"}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04.317? (Ex1)"}, {"role": "assistant", "content": "Track and validate the status of all ongoing incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-04.317."}, {"role": "assistant", "content": "Track and validate the status of all ongoing incidents"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04.318? (Ex2)"}, {"role": "assistant", "content": "Coordinate incident escalation or elevation with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-04.318."}, {"role": "assistant", "content": "Coordinate incident escalation or elevation with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05?"}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-05."}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-05?"}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05.319? (Ex1)"}, {"role": "assistant", "content": "Apply incident recovery criteria to known and assumed characteristics of the incident to determine whether incident recovery processes should be initiated"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-05.319."}, {"role": "assistant", "content": "Apply incident recovery criteria to known and assumed characteristics of the incident to determine whether incident recovery processes should be initiated"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05.320? (Ex2)"}, {"role": "assistant", "content": "Take the possible operational disruption of incident recovery activities into account"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-05.320."}, {"role": "assistant", "content": "Take the possible operational disruption of incident recovery activities into account"}]} {"messages": [{"role": "user", "content": "What is RS.AN? (Incident Analysis)"}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.AN."}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "What does RS.AN cover?"}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "What is RS.AN-01?"}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-01."}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-01?"}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-01?"}, {"role": "assistant", "content": "Incorporated into RS.MA-02"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-01."}, {"role": "assistant", "content": "Incorporated into RS.MA-02"}]} {"messages": [{"role": "user", "content": "What is RS.AN-02?"}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-02."}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-02?"}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-02?"}, {"role": "assistant", "content": "Incorporated into RS.MA-02, RS.MA-03, RS.MA-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-02."}, {"role": "assistant", "content": "Incorporated into RS.MA-02, RS.MA-03, RS.MA-04"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03?"}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-03."}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-03?"}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.321? (Ex1)"}, {"role": "assistant", "content": "Determine the sequence of events that occurred during the incident and which assets and resources were involved in each event"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.321."}, {"role": "assistant", "content": "Determine the sequence of events that occurred during the incident and which assets and resources were involved in each event"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.322? (Ex2)"}, {"role": "assistant", "content": "Attempt to determine what vulnerabilities, threats, and threat actors were directly or indirectly involved in the incident"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.322."}, {"role": "assistant", "content": "Attempt to determine what vulnerabilities, threats, and threat actors were directly or indirectly involved in the incident"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.323? (Ex3)"}, {"role": "assistant", "content": "Analyze the incident to find the underlying, systemic root causes"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.323."}, {"role": "assistant", "content": "Analyze the incident to find the underlying, systemic root causes"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.324? (Ex4)"}, {"role": "assistant", "content": "Check any cyber deception technology for additional information on attacker behavior"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.324."}, {"role": "assistant", "content": "Check any cyber deception technology for additional information on attacker behavior"}]} {"messages": [{"role": "user", "content": "What is RS.AN-04?"}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-04."}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-04?"}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-04?"}, {"role": "assistant", "content": "Moved to RS.MA-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-04."}, {"role": "assistant", "content": "Moved to RS.MA-03"}]} {"messages": [{"role": "user", "content": "What is RS.AN-05?"}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-05."}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-05?"}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-05?"}, {"role": "assistant", "content": "Moved to ID.RA-08"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-05."}, {"role": "assistant", "content": "Moved to ID.RA-08"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06?"}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-06."}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-06?"}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06.325? (Ex1)"}, {"role": "assistant", "content": "Require each incident responder and others (e.g., system administrators, cybersecurity engineers) who perform incident response tasks to record their actions and make the record immutable"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-06.325."}, {"role": "assistant", "content": "Require each incident responder and others (e.g., system administrators, cybersecurity engineers) who perform incident response tasks to record their actions and make the record immutable"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06.326? (Ex2)"}, {"role": "assistant", "content": "Require the incident lead to document the incident in detail and be responsible for preserving the integrity of the documentation and the sources of all information being reported"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-06.326."}, {"role": "assistant", "content": "Require the incident lead to document the incident in detail and be responsible for preserving the integrity of the documentation and the sources of all information being reported"}]} {"messages": [{"role": "user", "content": "What is RS.AN-07?"}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-07."}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-07?"}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.AN-07.327? (Ex1)"}, {"role": "assistant", "content": "Collect, preserve, and safeguard the integrity of all pertinent incident data and metadata (e.g., data source, date/time of collection) based on evidence preservation and chain-of-custody procedures"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-07.327."}, {"role": "assistant", "content": "Collect, preserve, and safeguard the integrity of all pertinent incident data and metadata (e.g., data source, date/time of collection) based on evidence preservation and chain-of-custody procedures"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08?"}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-08."}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-08?"}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08.328? (Ex1)"}, {"role": "assistant", "content": "Review other potential targets of the incident to search for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-08.328."}, {"role": "assistant", "content": "Review other potential targets of the incident to search for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08.329? (Ex2)"}, {"role": "assistant", "content": "Automatically run tools on targets to look for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-08.329."}, {"role": "assistant", "content": "Automatically run tools on targets to look for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "What is RS.CO? (Incident Response Reporting and Communication)"}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.CO."}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "What does RS.CO cover?"}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "What is RS.CO-01?"}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-01."}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-01?"}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-01?"}, {"role": "assistant", "content": "Incorporated into PR.AT-01"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-01."}, {"role": "assistant", "content": "Incorporated into PR.AT-01"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-02."}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.330? (Ex1)"}, {"role": "assistant", "content": "Follow the organization's breach notification procedures after discovering a data breach incident, including notifying affected customers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.330."}, {"role": "assistant", "content": "Follow the organization's breach notification procedures after discovering a data breach incident, including notifying affected customers"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.331? (Ex2)"}, {"role": "assistant", "content": "Notify business partners and customers of incidents in accordance with contractual requirements"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.331."}, {"role": "assistant", "content": "Notify business partners and customers of incidents in accordance with contractual requirements"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.332? (Ex3)"}, {"role": "assistant", "content": "Notify law enforcement agencies and regulatory bodies of incidents based on criteria in the incident response plan and management approval"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.332."}, {"role": "assistant", "content": "Notify law enforcement agencies and regulatory bodies of incidents based on criteria in the incident response plan and management approval"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03?"}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-03."}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-03?"}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.333? (Ex1)"}, {"role": "assistant", "content": "Securely share information consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.333."}, {"role": "assistant", "content": "Securely share information consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.334? (Ex2)"}, {"role": "assistant", "content": "Voluntarily share information about an attacker's observed TTPs, with all sensitive data removed, with an Information Sharing and Analysis Center (ISAC)"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.334."}, {"role": "assistant", "content": "Voluntarily share information about an attacker's observed TTPs, with all sensitive data removed, with an Information Sharing and Analysis Center (ISAC)"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.335? (Ex3)"}, {"role": "assistant", "content": "Notify HR when malicious insider activity occurs"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.335."}, {"role": "assistant", "content": "Notify HR when malicious insider activity occurs"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.336? (Ex4)"}, {"role": "assistant", "content": "Regularly update senior leadership on the status of major incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.336."}, {"role": "assistant", "content": "Regularly update senior leadership on the status of major incidents"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.337? (Ex5)"}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.337."}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.338? (Ex6)"}, {"role": "assistant", "content": "Coordinate crisis communication methods between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.338."}, {"role": "assistant", "content": "Coordinate crisis communication methods between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is RS.CO-04?"}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-04."}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-04?"}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-04?"}, {"role": "assistant", "content": "Incorporated into RS.MA-01, RS.MA-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-04."}, {"role": "assistant", "content": "Incorporated into RS.MA-01, RS.MA-04"}]} {"messages": [{"role": "user", "content": "What is RS.CO-05?"}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-05."}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-05?"}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-05?"}, {"role": "assistant", "content": "Incorporated into RS.CO-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-05."}, {"role": "assistant", "content": "Incorporated into RS.CO-03"}]} {"messages": [{"role": "user", "content": "What is RS.MI? (Incident Mitigation)"}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.MI."}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "What does RS.MI cover?"}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01?"}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-01."}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-01?"}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.339? (Ex1)"}, {"role": "assistant", "content": "Cybersecurity technologies (e.g., antivirus software) and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform containment actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.339."}, {"role": "assistant", "content": "Cybersecurity technologies (e.g., antivirus software) and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform containment actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.340? (Ex2)"}, {"role": "assistant", "content": "Allow incident responders to manually select and perform containment actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.340."}, {"role": "assistant", "content": "Allow incident responders to manually select and perform containment actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.341? (Ex3)"}, {"role": "assistant", "content": "Allow a third party (e.g., internet service provider, managed security service provider) to perform containment actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.341."}, {"role": "assistant", "content": "Allow a third party (e.g., internet service provider, managed security service provider) to perform containment actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.342? (Ex4)"}, {"role": "assistant", "content": "Automatically transfer compromised endpoints to a remediation virtual local area network (VLAN)"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.342."}, {"role": "assistant", "content": "Automatically transfer compromised endpoints to a remediation virtual local area network (VLAN)"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02?"}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-02."}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-02?"}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.343? (Ex1)"}, {"role": "assistant", "content": "Cybersecurity technologies and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform eradication actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.343."}, {"role": "assistant", "content": "Cybersecurity technologies and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform eradication actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.344? (Ex2)"}, {"role": "assistant", "content": "Allow incident responders to manually select and perform eradication actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.344."}, {"role": "assistant", "content": "Allow incident responders to manually select and perform eradication actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.345? (Ex3)"}, {"role": "assistant", "content": "Allow a third party (e.g., managed security service provider) to perform eradication actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.345."}, {"role": "assistant", "content": "Allow a third party (e.g., managed security service provider) to perform eradication actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "What is RS.MI-03?"}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-03."}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-03?"}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "What is WR-RS.MI-03?"}, {"role": "assistant", "content": "Incorporated into ID.RA-06"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.MI-03."}, {"role": "assistant", "content": "Incorporated into ID.RA-06"}]} {"messages": [{"role": "user", "content": "What is RS.RP-01?"}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.RP-01."}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.RP-01?"}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "What is WR-RS.RP-01?"}, {"role": "assistant", "content": "Incorporated into RS.MA-01"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.RP-01."}, {"role": "assistant", "content": "Incorporated into RS.MA-01"}]} {"messages": [{"role": "user", "content": "What is WR-RS.RP?"}, {"role": "assistant", "content": "Incorporated into RS.MA"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.RP."}, {"role": "assistant", "content": "Incorporated into RS.MA"}]} {"messages": [{"role": "user", "content": "What is RS.IM-01?"}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.IM-01."}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.IM-01?"}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM-01?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM-01."}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is RS.IM-02?"}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.IM-02."}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.IM-02?"}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM-02?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM-02."}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM?"}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM."}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "What is RC? (RECOVER)"}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC."}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "What does RC cover?"}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "What is RC.RP? (Incident Recovery Plan Execution)"}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC.RP."}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What does RC.RP cover?"}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01?"}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-01."}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-01?"}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01.346? (Ex1)"}, {"role": "assistant", "content": "Begin recovery procedures during or after incident response processes"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-01.346."}, {"role": "assistant", "content": "Begin recovery procedures during or after incident response processes"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01.347? (Ex2)"}, {"role": "assistant", "content": "Make all individuals with recovery responsibilities aware of the plans for recovery and the authorizations required to implement each aspect of the plans"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-01.347."}, {"role": "assistant", "content": "Make all individuals with recovery responsibilities aware of the plans for recovery and the authorizations required to implement each aspect of the plans"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02?"}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-02."}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-02?"}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02.348? (Ex1)"}, {"role": "assistant", "content": "Select recovery actions based on the criteria defined in the incident response plan and available resources"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-02.348."}, {"role": "assistant", "content": "Select recovery actions based on the criteria defined in the incident response plan and available resources"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02.349? (Ex2)"}, {"role": "assistant", "content": "Change planned recovery actions based on a reassessment of organizational needs and resources"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-02.349."}, {"role": "assistant", "content": "Change planned recovery actions based on a reassessment of organizational needs and resources"}]} {"messages": [{"role": "user", "content": "What is RC.RP-03?"}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-03."}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-03?"}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-03.350? (Ex1)"}, {"role": "assistant", "content": "Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-03.350."}, {"role": "assistant", "content": "Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04?"}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-04."}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-04?"}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.351? (Ex1)"}, {"role": "assistant", "content": "Use business impact and system categorization records (including service delivery objectives) to validate that essential services are restored in the appropriate order"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.351."}, {"role": "assistant", "content": "Use business impact and system categorization records (including service delivery objectives) to validate that essential services are restored in the appropriate order"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.352? (Ex2)"}, {"role": "assistant", "content": "Work with system owners to confirm the successful restoration of systems and the return to normal operations"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.352."}, {"role": "assistant", "content": "Work with system owners to confirm the successful restoration of systems and the return to normal operations"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.353? (Ex3)"}, {"role": "assistant", "content": "Monitor the performance of restored systems to verify the adequacy of the restoration"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.353."}, {"role": "assistant", "content": "Monitor the performance of restored systems to verify the adequacy of the restoration"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05?"}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-05."}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-05?"}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05.354? (Ex1)"}, {"role": "assistant", "content": "Check restored assets for indicators of compromise and remediation of root causes of the incident before production use"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-05.354."}, {"role": "assistant", "content": "Check restored assets for indicators of compromise and remediation of root causes of the incident before production use"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05.355? (Ex2)"}, {"role": "assistant", "content": "Verify the correctness and adequacy of the restoration actions taken before putting a restored system online"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-05.355."}, {"role": "assistant", "content": "Verify the correctness and adequacy of the restoration actions taken before putting a restored system online"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06?"}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-06."}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-06?"}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06.356? (Ex1)"}, {"role": "assistant", "content": "Prepare an after-action report that documents the incident itself, the response and recovery actions taken, and lessons learned"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-06.356."}, {"role": "assistant", "content": "Prepare an after-action report that documents the incident itself, the response and recovery actions taken, and lessons learned"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06.357? (Ex2)"}, {"role": "assistant", "content": "Declare the end of incident recovery once the criteria are met"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-06.357."}, {"role": "assistant", "content": "Declare the end of incident recovery once the criteria are met"}]} {"messages": [{"role": "user", "content": "What is RC.CO? (Incident Recovery Communication)"}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC.CO."}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "What does RC.CO cover?"}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "What is RC.CO-01?"}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-01."}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-01?"}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "What is WR-RC.CO-01?"}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.CO-01."}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "What is RC.CO-02?"}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-02."}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-02?"}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "What is WR-RC.CO-02?"}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.CO-02."}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03?"}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-03."}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-03?"}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.358? (Ex1)"}, {"role": "assistant", "content": "Securely share recovery information, including restoration progress, consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.358."}, {"role": "assistant", "content": "Securely share recovery information, including restoration progress, consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.359? (Ex2)"}, {"role": "assistant", "content": "Regularly update senior leadership on recovery status and restoration progress for major incidents"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.359."}, {"role": "assistant", "content": "Regularly update senior leadership on recovery status and restoration progress for major incidents"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.360? (Ex3)"}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.360."}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.361? (Ex4)"}, {"role": "assistant", "content": "Coordinate crisis communication between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.361."}, {"role": "assistant", "content": "Coordinate crisis communication between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04?"}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-04."}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-04?"}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04.362? (Ex1)"}, {"role": "assistant", "content": "Follow the organization's breach notification procedures for recovering from a data breach incident"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-04.362."}, {"role": "assistant", "content": "Follow the organization's breach notification procedures for recovering from a data breach incident"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04.363? (Ex2)"}, {"role": "assistant", "content": "Explain the steps being taken to recover from the incident and to prevent a recurrence"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-04.363."}, {"role": "assistant", "content": "Explain the steps being taken to recover from the incident and to prevent a recurrence"}]} {"messages": [{"role": "user", "content": "What is RC.IM-01?"}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.IM-01."}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.IM-01?"}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM-01?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM-01."}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is RC.IM-02?"}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.IM-02."}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.IM-02?"}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM-02?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM-02."}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM?"}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM."}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "What is GV.OC? (Organizational Context)"}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.OC."}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "What does GV.OC cover?"}, {"role": "assistant", "content": "The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood"}]} {"messages": [{"role": "user", "content": "What is GV.RM? (Risk Management Strategy)"}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.RM."}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "What does GV.RM cover?"}, {"role": "assistant", "content": "The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions"}]} {"messages": [{"role": "user", "content": "What is GV.RR? (Roles, Responsibilities, and Authorities)"}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.RR."}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "What does GV.RR cover?"}, {"role": "assistant", "content": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.PO? (Policy)"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.PO."}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "What does GV.PO cover?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established, communicated, and enforced"}]} {"messages": [{"role": "user", "content": "What is GV.OV? (Oversight)"}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.OV."}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "What does GV.OV cover?"}, {"role": "assistant", "content": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy"}]} {"messages": [{"role": "user", "content": "What is GV.SC? (Cybersecurity Supply Chain Risk Management)"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV.SC."}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What does GV.SC cover?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is ID.AM? (Asset Management)"}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.AM."}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "What does ID.AM cover?"}, {"role": "assistant", "content": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization's risk strategy"}]} {"messages": [{"role": "user", "content": "What is ID.RA? (Risk Assessment)"}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.RA."}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "What does ID.RA cover?"}, {"role": "assistant", "content": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization"}]} {"messages": [{"role": "user", "content": "What is ID.IM? (Improvement)"}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID.IM."}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "What does ID.IM cover?"}, {"role": "assistant", "content": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions"}]} {"messages": [{"role": "user", "content": "What is PR.AA? (Identity Management, Authentication, and Access Control)"}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.AA."}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "What does PR.AA cover?"}, {"role": "assistant", "content": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access"}]} {"messages": [{"role": "user", "content": "What is PR.AT? (Awareness and Training)"}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.AT."}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "What does PR.AT cover?"}, {"role": "assistant", "content": "The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks"}]} {"messages": [{"role": "user", "content": "What is PR.DS? (Data Security)"}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.DS."}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "What does PR.DS cover?"}, {"role": "assistant", "content": "Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information"}]} {"messages": [{"role": "user", "content": "What is PR.PS? (Platform Security)"}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.PS."}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "What does PR.PS cover?"}, {"role": "assistant", "content": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization's risk strategy to protect their confidentiality, integrity, and availability"}]} {"messages": [{"role": "user", "content": "What is PR.IR? (Technology Infrastructure Resilience)"}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR.IR."}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "What does PR.IR cover?"}, {"role": "assistant", "content": "Security architectures are managed with the organization's risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience"}]} {"messages": [{"role": "user", "content": "What is DE.CM? (Continuous Monitoring)"}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE.CM."}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "What does DE.CM cover?"}, {"role": "assistant", "content": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.AE? (Adverse Event Analysis)"}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE.AE."}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What does DE.AE cover?"}, {"role": "assistant", "content": "Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is RS.MA? (Incident Management)"}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.MA."}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "What does RS.MA cover?"}, {"role": "assistant", "content": "Responses to detected cybersecurity incidents are managed"}]} {"messages": [{"role": "user", "content": "What is RS.AN? (Incident Analysis)"}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.AN."}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "What does RS.AN cover?"}, {"role": "assistant", "content": "Investigations are conducted to ensure effective response and support forensics and recovery activities"}]} {"messages": [{"role": "user", "content": "What is RS.CO? (Incident Response Reporting and Communication)"}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.CO."}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "What does RS.CO cover?"}, {"role": "assistant", "content": "Response activities are coordinated with internal and external stakeholders as required by laws, regulations, or policies"}]} {"messages": [{"role": "user", "content": "What is RS.MI? (Incident Mitigation)"}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS.MI."}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "What does RS.MI cover?"}, {"role": "assistant", "content": "Activities are performed to prevent expansion of an event and mitigate its effects"}]} {"messages": [{"role": "user", "content": "What is RC.RP? (Incident Recovery Plan Execution)"}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC.RP."}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What does RC.RP cover?"}, {"role": "assistant", "content": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is RC.CO? (Incident Recovery Communication)"}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC.CO."}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "What does RC.CO cover?"}, {"role": "assistant", "content": "Restoration activities are coordinated with internal and external parties"}]} {"messages": [{"role": "user", "content": "What is GV? (GOVERN)"}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "Summarize the scope of GV."}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "What does GV cover?"}, {"role": "assistant", "content": "The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored"}]} {"messages": [{"role": "user", "content": "What is ID? (IDENTIFY)"}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "Summarize the scope of ID."}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "What does ID cover?"}, {"role": "assistant", "content": "The organization's current cybersecurity risks are understood"}]} {"messages": [{"role": "user", "content": "What is PR? (PROTECT)"}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "Summarize the scope of PR."}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "What does PR cover?"}, {"role": "assistant", "content": "Safeguards to manage the organization's cybersecurity risks are used"}]} {"messages": [{"role": "user", "content": "What is DE? (DETECT)"}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "Summarize the scope of DE."}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "What does DE cover?"}, {"role": "assistant", "content": "Possible cybersecurity attacks and compromises are found and analyzed"}]} {"messages": [{"role": "user", "content": "What is RS? (RESPOND)"}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RS."}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "What does RS cover?"}, {"role": "assistant", "content": "Actions regarding a detected cybersecurity incident are taken"}]} {"messages": [{"role": "user", "content": "What is RC? (RECOVER)"}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "Summarize the scope of RC."}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "What does RC cover?"}, {"role": "assistant", "content": "Assets and operations affected by a cybersecurity incident are restored"}]} {"messages": [{"role": "user", "content": "What is GV.OC-01.001? (Ex1)"}, {"role": "assistant", "content": "Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-01.001."}, {"role": "assistant", "content": "Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02.002? (Ex1)"}, {"role": "assistant", "content": "Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-02.002."}, {"role": "assistant", "content": "Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02.003? (Ex2)"}, {"role": "assistant", "content": "Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-02.003."}, {"role": "assistant", "content": "Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.004? (Ex1)"}, {"role": "assistant", "content": "Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.004."}, {"role": "assistant", "content": "Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.005? (Ex2)"}, {"role": "assistant", "content": "Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.005."}, {"role": "assistant", "content": "Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03.006? (Ex3)"}, {"role": "assistant", "content": "Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-03.006."}, {"role": "assistant", "content": "Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.007? (Ex1)"}, {"role": "assistant", "content": "Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.007."}, {"role": "assistant", "content": "Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.008? (Ex2)"}, {"role": "assistant", "content": "Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.008."}, {"role": "assistant", "content": "Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04.009? (Ex3)"}, {"role": "assistant", "content": "Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-04.009."}, {"role": "assistant", "content": "Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05.010? (Ex1)"}, {"role": "assistant", "content": "Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-05.010."}, {"role": "assistant", "content": "Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05.011? (Ex2)"}, {"role": "assistant", "content": "Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel"}]} {"messages": [{"role": "user", "content": "Explain GV.OC-05.011."}, {"role": "assistant", "content": "Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.012? (Ex1)"}, {"role": "assistant", "content": "Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.012."}, {"role": "assistant", "content": "Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.013? (Ex2)"}, {"role": "assistant", "content": "Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.013."}, {"role": "assistant", "content": "Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01.014? (Ex3)"}, {"role": "assistant", "content": "Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-01.014."}, {"role": "assistant", "content": "Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.015? (Ex1)"}, {"role": "assistant", "content": "Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.015."}, {"role": "assistant", "content": "Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.016? (Ex2)"}, {"role": "assistant", "content": "Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.016."}, {"role": "assistant", "content": "Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02.017? (Ex3)"}, {"role": "assistant", "content": "Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-02.017."}, {"role": "assistant", "content": "Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.018? (Ex1)"}, {"role": "assistant", "content": "Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.018."}, {"role": "assistant", "content": "Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.019? (Ex2)"}, {"role": "assistant", "content": "Include cybersecurity risk managers in enterprise risk management planning"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.019."}, {"role": "assistant", "content": "Include cybersecurity risk managers in enterprise risk management planning"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03.020? (Ex3)"}, {"role": "assistant", "content": "Establish criteria for escalating cybersecurity risks within enterprise risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-03.020."}, {"role": "assistant", "content": "Establish criteria for escalating cybersecurity risks within enterprise risk management"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.021? (Ex1)"}, {"role": "assistant", "content": "Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.021."}, {"role": "assistant", "content": "Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.022? (Ex2)"}, {"role": "assistant", "content": "Determine whether to purchase cybersecurity insurance"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.022."}, {"role": "assistant", "content": "Determine whether to purchase cybersecurity insurance"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04.023? (Ex3)"}, {"role": "assistant", "content": "Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-04.023."}, {"role": "assistant", "content": "Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05.024? (Ex1)"}, {"role": "assistant", "content": "Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-05.024."}, {"role": "assistant", "content": "Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05.025? (Ex2)"}, {"role": "assistant", "content": "Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-05.025."}, {"role": "assistant", "content": "Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.026? (Ex1)"}, {"role": "assistant", "content": "Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.026."}, {"role": "assistant", "content": "Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.027? (Ex2)"}, {"role": "assistant", "content": "Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.027."}, {"role": "assistant", "content": "Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.028? (Ex3)"}, {"role": "assistant", "content": "Establish criteria for risk prioritization at the appropriate levels within the enterprise"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.028."}, {"role": "assistant", "content": "Establish criteria for risk prioritization at the appropriate levels within the enterprise"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06.029? (Ex4)"}, {"role": "assistant", "content": "Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-06.029."}, {"role": "assistant", "content": "Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.030? (Ex1)"}, {"role": "assistant", "content": "Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.030."}, {"role": "assistant", "content": "Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.031? (Ex2)"}, {"role": "assistant", "content": "Identify stretch goals and document them"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.031."}, {"role": "assistant", "content": "Identify stretch goals and document them"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07.032? (Ex3)"}, {"role": "assistant", "content": "Calculate, document, and prioritize positive risks alongside negative risks"}]} {"messages": [{"role": "user", "content": "Explain GV.RM-07.032."}, {"role": "assistant", "content": "Calculate, document, and prioritize positive risks alongside negative risks"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.033? (Ex1)"}, {"role": "assistant", "content": "Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.033."}, {"role": "assistant", "content": "Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.034? (Ex2)"}, {"role": "assistant", "content": "Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.034."}, {"role": "assistant", "content": "Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.035? (Ex3)"}, {"role": "assistant", "content": "Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.035."}, {"role": "assistant", "content": "Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01.036? (Ex4)"}, {"role": "assistant", "content": "Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-01.036."}, {"role": "assistant", "content": "Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.037? (Ex1)"}, {"role": "assistant", "content": "Document risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.037."}, {"role": "assistant", "content": "Document risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.038? (Ex2)"}, {"role": "assistant", "content": "Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.038."}, {"role": "assistant", "content": "Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.039? (Ex3)"}, {"role": "assistant", "content": "Include cybersecurity responsibilities and performance requirements in personnel descriptions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.039."}, {"role": "assistant", "content": "Include cybersecurity responsibilities and performance requirements in personnel descriptions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.040? (Ex4)"}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.040."}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02.041? (Ex5)"}, {"role": "assistant", "content": "Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-02.041."}, {"role": "assistant", "content": "Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.042? (Ex1)"}, {"role": "assistant", "content": "Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.042."}, {"role": "assistant", "content": "Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.043? (Ex2)"}, {"role": "assistant", "content": "Identify resource allocation and investment in line with risk tolerance and response"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.043."}, {"role": "assistant", "content": "Identify resource allocation and investment in line with risk tolerance and response"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03.044? (Ex3)"}, {"role": "assistant", "content": "Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-03.044."}, {"role": "assistant", "content": "Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.045? (Ex1)"}, {"role": "assistant", "content": "Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.045."}, {"role": "assistant", "content": "Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.046? (Ex2)"}, {"role": "assistant", "content": "Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.046."}, {"role": "assistant", "content": "Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.047? (Ex3)"}, {"role": "assistant", "content": "Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.047."}, {"role": "assistant", "content": "Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04.048? (Ex4)"}, {"role": "assistant", "content": "Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles"}]} {"messages": [{"role": "user", "content": "Explain GV.RR-04.048."}, {"role": "assistant", "content": "Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.049? (Ex1)"}, {"role": "assistant", "content": "Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.049."}, {"role": "assistant", "content": "Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.050? (Ex2)"}, {"role": "assistant", "content": "Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.050."}, {"role": "assistant", "content": "Periodically review policy and supporting processes and procedures to ensure that they align with risk management strategy objectives and priorities, as well as the high-level direction of the cybersecurity policy"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.051? (Ex3)"}, {"role": "assistant", "content": "Require approval from senior management on policy"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.051."}, {"role": "assistant", "content": "Require approval from senior management on policy"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.052? (Ex4)"}, {"role": "assistant", "content": "Communicate cybersecurity risk management policy and supporting processes and procedures across the organization"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.052."}, {"role": "assistant", "content": "Communicate cybersecurity risk management policy and supporting processes and procedures across the organization"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01.053? (Ex5)"}, {"role": "assistant", "content": "Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-01.053."}, {"role": "assistant", "content": "Require personnel to acknowledge receipt of policy when first hired, annually, and whenever policy is updated"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.054? (Ex1)"}, {"role": "assistant", "content": "Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.054."}, {"role": "assistant", "content": "Update policy based on periodic reviews of cybersecurity risk management results to ensure that policy and supporting processes and procedures adequately maintain risk at an acceptable level"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.055? (Ex2)"}, {"role": "assistant", "content": "Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.055."}, {"role": "assistant", "content": "Provide a timeline for reviewing changes to the organization's risk environment (e.g., changes in risk or in the organization's mission objectives), and communicate recommended policy updates"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.056? (Ex3)"}, {"role": "assistant", "content": "Update policy to reflect changes in legal and regulatory requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.056."}, {"role": "assistant", "content": "Update policy to reflect changes in legal and regulatory requirements"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02.057? (Ex4)"}, {"role": "assistant", "content": "Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)"}]} {"messages": [{"role": "user", "content": "Explain GV.PO-02.057."}, {"role": "assistant", "content": "Update policy to reflect changes in technology (e.g., adoption of artificial intelligence) and changes to the business (e.g., acquisition of a new business, new contract requirements)"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01.058? (Ex1)"}, {"role": "assistant", "content": "Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-01.058."}, {"role": "assistant", "content": "Measure how well the risk management strategy and risk results have helped leaders make decisions and achieve organizational objectives"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01.059? (Ex2)"}, {"role": "assistant", "content": "Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-01.059."}, {"role": "assistant", "content": "Examine whether cybersecurity risk strategies that impede operations or innovation should be adjusted"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.060? (Ex1)"}, {"role": "assistant", "content": "Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.060."}, {"role": "assistant", "content": "Review audit findings to confirm whether the existing cybersecurity strategy has ensured compliance with internal and external requirements"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.061? (Ex2)"}, {"role": "assistant", "content": "Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.061."}, {"role": "assistant", "content": "Review the performance oversight of those in cybersecurity-related roles to determine whether policy changes are necessary"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02.062? (Ex3)"}, {"role": "assistant", "content": "Review strategy in light of cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-02.062."}, {"role": "assistant", "content": "Review strategy in light of cybersecurity incidents"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.063? (Ex1)"}, {"role": "assistant", "content": "Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.063."}, {"role": "assistant", "content": "Review key performance indicators (KPIs) to ensure that organization-wide policies and procedures achieve objectives"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.064? (Ex2)"}, {"role": "assistant", "content": "Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.064."}, {"role": "assistant", "content": "Review key risk indicators (KRIs) to identify risks the organization faces, including likelihood and potential impact"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03.065? (Ex3)"}, {"role": "assistant", "content": "Collect and communicate metrics on cybersecurity risk management with senior leadership"}]} {"messages": [{"role": "user", "content": "Explain GV.OV-03.065."}, {"role": "assistant", "content": "Collect and communicate metrics on cybersecurity risk management with senior leadership"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.066? (Ex1)"}, {"role": "assistant", "content": "Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.066."}, {"role": "assistant", "content": "Establish a strategy that expresses the objectives of the cybersecurity supply chain risk management program"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.067? (Ex2)"}, {"role": "assistant", "content": "Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.067."}, {"role": "assistant", "content": "Develop the cybersecurity supply chain risk management program, including a plan (with milestones), policies, and procedures that guide implementation and improvement of the program, and share the policies and procedures with the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.068? (Ex3)"}, {"role": "assistant", "content": "Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.068."}, {"role": "assistant", "content": "Develop and implement program processes based on the strategy, objectives, policies, and procedures that are agreed upon and performed by the organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01.069? (Ex4)"}, {"role": "assistant", "content": "Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-01.069."}, {"role": "assistant", "content": "Establish a cross-organizational mechanism that ensures alignment between functions that contribute to cybersecurity supply chain risk management, such as cybersecurity, IT, operations, legal, human resources, and engineering"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.070? (Ex1)"}, {"role": "assistant", "content": "Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.070."}, {"role": "assistant", "content": "Identify one or more specific roles or positions that will be responsible and accountable for planning, resourcing, and executing cybersecurity supply chain risk management activities"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.071? (Ex2)"}, {"role": "assistant", "content": "Document cybersecurity supply chain risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.071."}, {"role": "assistant", "content": "Document cybersecurity supply chain risk management roles and responsibilities in policy"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.072? (Ex3)"}, {"role": "assistant", "content": "Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.072."}, {"role": "assistant", "content": "Create responsibility matrixes to document who will be responsible and accountable for cybersecurity supply chain risk management activities and how those teams and individuals will be consulted and informed"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.073? (Ex4)"}, {"role": "assistant", "content": "Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.073."}, {"role": "assistant", "content": "Include cybersecurity supply chain risk management responsibilities and performance requirements in personnel descriptions to ensure clarity and improve accountability"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.074? (Ex5)"}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.074."}, {"role": "assistant", "content": "Document performance goals for personnel with cybersecurity risk management-specific responsibilities, and periodically measure them to demonstrate and improve performance"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.075? (Ex6)"}, {"role": "assistant", "content": "Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.075."}, {"role": "assistant", "content": "Develop roles and responsibilities for suppliers, customers, and business partners to address shared responsibilities for applicable cybersecurity risks, and integrate them into organizational policies and applicable third-party agreements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.076? (Ex7)"}, {"role": "assistant", "content": "Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.076."}, {"role": "assistant", "content": "Internally communicate cybersecurity supply chain risk management roles and responsibilities for third parties"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02.077? (Ex8)"}, {"role": "assistant", "content": "Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-02.077."}, {"role": "assistant", "content": "Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.078? (Ex1)"}, {"role": "assistant", "content": "Identify areas of alignment and overlap with cybersecurity and enterprise risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.078."}, {"role": "assistant", "content": "Identify areas of alignment and overlap with cybersecurity and enterprise risk management"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.079? (Ex2)"}, {"role": "assistant", "content": "Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.079."}, {"role": "assistant", "content": "Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.080? (Ex3)"}, {"role": "assistant", "content": "Integrate cybersecurity supply chain risk management into improvement processes"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.080."}, {"role": "assistant", "content": "Integrate cybersecurity supply chain risk management into improvement processes"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03.081? (Ex4)"}, {"role": "assistant", "content": "Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-03.081."}, {"role": "assistant", "content": "Escalate material cybersecurity risks in supply chains to senior management, and address them at the enterprise risk management level"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04.082? (Ex1)"}, {"role": "assistant", "content": "Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-04.082."}, {"role": "assistant", "content": "Develop criteria for supplier criticality based on, for example, the sensitivity of data processed or possessed by suppliers, the degree of access to the organization's systems, and the importance of the products or services to the organization's mission"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04.083? (Ex2)"}, {"role": "assistant", "content": "Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-04.083."}, {"role": "assistant", "content": "Keep a record of all suppliers, and prioritize suppliers based on the criticality criteria"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.084? (Ex1)"}, {"role": "assistant", "content": "Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.084."}, {"role": "assistant", "content": "Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.085? (Ex2)"}, {"role": "assistant", "content": "Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.085."}, {"role": "assistant", "content": "Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.086? (Ex3)"}, {"role": "assistant", "content": "Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.086."}, {"role": "assistant", "content": "Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.087? (Ex4)"}, {"role": "assistant", "content": "Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.087."}, {"role": "assistant", "content": "Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.088? (Ex5)"}, {"role": "assistant", "content": "Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.088."}, {"role": "assistant", "content": "Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.089? (Ex6)"}, {"role": "assistant", "content": "Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.089."}, {"role": "assistant", "content": "Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.090? (Ex7)"}, {"role": "assistant", "content": "Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.090."}, {"role": "assistant", "content": "Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.091? (Ex8)"}, {"role": "assistant", "content": "Contractually require suppliers to vet their employees and guard against insider threats"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.091."}, {"role": "assistant", "content": "Contractually require suppliers to vet their employees and guard against insider threats"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.092? (Ex9)"}, {"role": "assistant", "content": "Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.092."}, {"role": "assistant", "content": "Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05.093? (Ex10)"}, {"role": "assistant", "content": "Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-05.093."}, {"role": "assistant", "content": "Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.094? (Ex1)"}, {"role": "assistant", "content": "Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.094."}, {"role": "assistant", "content": "Perform thorough due diligence on prospective suppliers that is consistent with procurement planning and commensurate with the level of risk, criticality, and complexity of each supplier relationship"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.095? (Ex2)"}, {"role": "assistant", "content": "Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.095."}, {"role": "assistant", "content": "Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.096? (Ex3)"}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.096."}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06.097? (Ex4)"}, {"role": "assistant", "content": "Assess the authenticity, integrity, and security of critical products prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-06.097."}, {"role": "assistant", "content": "Assess the authenticity, integrity, and security of critical products prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.098? (Ex1)"}, {"role": "assistant", "content": "Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.098."}, {"role": "assistant", "content": "Adjust assessment formats and frequencies based on the third party's reputation and the criticality of the products or services they provide"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.099? (Ex2)"}, {"role": "assistant", "content": "Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.099."}, {"role": "assistant", "content": "Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.100? (Ex3)"}, {"role": "assistant", "content": "Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.100."}, {"role": "assistant", "content": "Monitor critical suppliers to ensure that they are fulfilling their security obligations throughout the supplier relationship lifecycle using a variety of methods and techniques, such as inspections, audits, tests, or other forms of evaluation"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.101? (Ex4)"}, {"role": "assistant", "content": "Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.101."}, {"role": "assistant", "content": "Monitor critical suppliers, services, and products for changes to their risk profiles, and reevaluate supplier criticality and risk impact accordingly"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07.102? (Ex5)"}, {"role": "assistant", "content": "Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-07.102."}, {"role": "assistant", "content": "Plan for unexpected supplier and supply chain-related interruptions to ensure business continuity"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.103? (Ex1)"}, {"role": "assistant", "content": "Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.103."}, {"role": "assistant", "content": "Define and use rules and protocols for reporting incident response and recovery activities and the status between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.104? (Ex2)"}, {"role": "assistant", "content": "Identify and document the roles and responsibilities of the organization and its suppliers for incident response"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.104."}, {"role": "assistant", "content": "Identify and document the roles and responsibilities of the organization and its suppliers for incident response"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.105? (Ex3)"}, {"role": "assistant", "content": "Include critical suppliers in incident response exercises and simulations"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.105."}, {"role": "assistant", "content": "Include critical suppliers in incident response exercises and simulations"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.106? (Ex4)"}, {"role": "assistant", "content": "Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.106."}, {"role": "assistant", "content": "Define and coordinate crisis communication methods and protocols between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08.107? (Ex5)"}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-08.107."}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with critical suppliers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.108? (Ex1)"}, {"role": "assistant", "content": "Policies and procedures require provenance records for all acquired technology products and services"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.108."}, {"role": "assistant", "content": "Policies and procedures require provenance records for all acquired technology products and services"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.109? (Ex2)"}, {"role": "assistant", "content": "Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.109."}, {"role": "assistant", "content": "Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.110? (Ex3)"}, {"role": "assistant", "content": "Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.110."}, {"role": "assistant", "content": "Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.111? (Ex4)"}, {"role": "assistant", "content": "Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.111."}, {"role": "assistant", "content": "Review policies to ensure that they require approved supplier personnel to perform maintenance on supplier products"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09.112? (Ex5)"}, {"role": "assistant", "content": "Policies and procedure require checking upgrades to critical hardware for unauthorized changes"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-09.112."}, {"role": "assistant", "content": "Policies and procedure require checking upgrades to critical hardware for unauthorized changes"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.113? (Ex1)"}, {"role": "assistant", "content": "Establish processes for terminating critical relationships under both normal and adverse circumstances"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.113."}, {"role": "assistant", "content": "Establish processes for terminating critical relationships under both normal and adverse circumstances"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.114? (Ex2)"}, {"role": "assistant", "content": "Define and implement plans for component end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.114."}, {"role": "assistant", "content": "Define and implement plans for component end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.115? (Ex3)"}, {"role": "assistant", "content": "Verify that supplier access to organization resources is deactivated promptly when it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.115."}, {"role": "assistant", "content": "Verify that supplier access to organization resources is deactivated promptly when it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.116? (Ex4)"}, {"role": "assistant", "content": "Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.116."}, {"role": "assistant", "content": "Verify that assets containing the organization's data are returned or properly disposed of in a timely, controlled, and safe manner"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.117? (Ex5)"}, {"role": "assistant", "content": "Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.117."}, {"role": "assistant", "content": "Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.118? (Ex6)"}, {"role": "assistant", "content": "Mitigate risks to data and systems created by supplier termination"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.118."}, {"role": "assistant", "content": "Mitigate risks to data and systems created by supplier termination"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10.119? (Ex7)"}, {"role": "assistant", "content": "Manage data leakage risks associated with supplier termination"}]} {"messages": [{"role": "user", "content": "Explain GV.SC-10.119."}, {"role": "assistant", "content": "Manage data leakage risks associated with supplier termination"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01.120? (Ex1)"}, {"role": "assistant", "content": "Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-01.120."}, {"role": "assistant", "content": "Maintain inventories for all types of hardware, including IT, IoT, OT, and mobile devices"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01.121? (Ex2)"}, {"role": "assistant", "content": "Constantly monitor networks to detect new hardware and automatically update inventories"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-01.121."}, {"role": "assistant", "content": "Constantly monitor networks to detect new hardware and automatically update inventories"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.122? (Ex1)"}, {"role": "assistant", "content": "Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.122."}, {"role": "assistant", "content": "Maintain inventories for all types of software and services, including commercial-off-the-shelf, open-source, custom applications, API services, and cloud-based applications and services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.123? (Ex2)"}, {"role": "assistant", "content": "Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.123."}, {"role": "assistant", "content": "Constantly monitor all platforms, including containers and virtual machines, for software and service inventory changes"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02.124? (Ex3)"}, {"role": "assistant", "content": "Maintain an inventory of the organization's systems"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-02.124."}, {"role": "assistant", "content": "Maintain an inventory of the organization's systems"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.125? (Ex1)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows within the organization's wired and wireless networks"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.125."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows within the organization's wired and wireless networks"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.126? (Ex2)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows between the organization and third parties"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.126."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows between the organization and third parties"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.127? (Ex3)"}, {"role": "assistant", "content": "Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.127."}, {"role": "assistant", "content": "Maintain baselines of communication and data flows for the organization's infrastructure-as-a-service (IaaS) usage"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03.128? (Ex4)"}, {"role": "assistant", "content": "Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-03.128."}, {"role": "assistant", "content": "Maintain documentation of expected network ports, protocols, and services that are typically used among authorized systems"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04.129? (Ex1)"}, {"role": "assistant", "content": "Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-04.129."}, {"role": "assistant", "content": "Inventory all external services used by the organization, including third-party infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) offerings; APIs; and other externally hosted application services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04.130? (Ex2)"}, {"role": "assistant", "content": "Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-04.130."}, {"role": "assistant", "content": "Update the inventory when a new external service is going to be utilized to ensure adequate cybersecurity risk management monitoring of the organization's use of that service"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.131? (Ex1)"}, {"role": "assistant", "content": "Define criteria for prioritizing each class of assets"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.131."}, {"role": "assistant", "content": "Define criteria for prioritizing each class of assets"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.132? (Ex2)"}, {"role": "assistant", "content": "Apply the prioritization criteria to assets"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.132."}, {"role": "assistant", "content": "Apply the prioritization criteria to assets"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05.133? (Ex3)"}, {"role": "assistant", "content": "Track the asset priorities and update them periodically or when significant changes to the organization occur"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-05.133."}, {"role": "assistant", "content": "Track the asset priorities and update them periodically or when significant changes to the organization occur"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.134? (Ex1)"}, {"role": "assistant", "content": "Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.134."}, {"role": "assistant", "content": "Maintain a list of the designated data types of interest (e.g., personally identifiable information, protected health information, financial account numbers, organization intellectual property, operational technology data)"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.135? (Ex2)"}, {"role": "assistant", "content": "Continuously discover and analyze ad hoc data to identify new instances of designated data types"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.135."}, {"role": "assistant", "content": "Continuously discover and analyze ad hoc data to identify new instances of designated data types"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.136? (Ex3)"}, {"role": "assistant", "content": "Assign data classifications to designated data types through tags or labels"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.136."}, {"role": "assistant", "content": "Assign data classifications to designated data types through tags or labels"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07.137? (Ex4)"}, {"role": "assistant", "content": "Track the provenance, data owner, and geolocation of each instance of designated data types"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-07.137."}, {"role": "assistant", "content": "Track the provenance, data owner, and geolocation of each instance of designated data types"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.138? (Ex1)"}, {"role": "assistant", "content": "Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.138."}, {"role": "assistant", "content": "Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.139? (Ex2)"}, {"role": "assistant", "content": "Integrate cybersecurity considerations into product life cycles"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.139."}, {"role": "assistant", "content": "Integrate cybersecurity considerations into product life cycles"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.140? (Ex3)"}, {"role": "assistant", "content": "Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.140."}, {"role": "assistant", "content": "Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.141? (Ex4)"}, {"role": "assistant", "content": "Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.141."}, {"role": "assistant", "content": "Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.142? (Ex5)"}, {"role": "assistant", "content": "Properly configure and secure systems, hardware, software, and services prior to their deployment in production"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.142."}, {"role": "assistant", "content": "Properly configure and secure systems, hardware, software, and services prior to their deployment in production"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.143? (Ex6)"}, {"role": "assistant", "content": "Update inventories when systems, hardware, software, and services are moved or transferred within the organization"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.143."}, {"role": "assistant", "content": "Update inventories when systems, hardware, software, and services are moved or transferred within the organization"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.144? (Ex7)"}, {"role": "assistant", "content": "Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.144."}, {"role": "assistant", "content": "Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.145? (Ex8)"}, {"role": "assistant", "content": "Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.145."}, {"role": "assistant", "content": "Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08.146? (Ex9)"}, {"role": "assistant", "content": "Offer methods for destroying paper, storage media, and other physical forms of data storage"}]} {"messages": [{"role": "user", "content": "Explain ID.AM-08.146."}, {"role": "assistant", "content": "Offer methods for destroying paper, storage media, and other physical forms of data storage"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.147? (Ex1)"}, {"role": "assistant", "content": "Use vulnerability management technologies to identify unpatched and misconfigured software"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.147."}, {"role": "assistant", "content": "Use vulnerability management technologies to identify unpatched and misconfigured software"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.148? (Ex2)"}, {"role": "assistant", "content": "Assess network and system architectures for design and implementation weaknesses that affect cybersecurity"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.148."}, {"role": "assistant", "content": "Assess network and system architectures for design and implementation weaknesses that affect cybersecurity"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.149? (Ex3)"}, {"role": "assistant", "content": "Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.149."}, {"role": "assistant", "content": "Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.150? (Ex4)"}, {"role": "assistant", "content": "Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.150."}, {"role": "assistant", "content": "Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.151? (Ex5)"}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.151."}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01.152? (Ex6)"}, {"role": "assistant", "content": "Review processes and procedures for weaknesses that could be exploited to affect cybersecurity"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-01.152."}, {"role": "assistant", "content": "Review processes and procedures for weaknesses that could be exploited to affect cybersecurity"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.153? (Ex1)"}, {"role": "assistant", "content": "Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.153."}, {"role": "assistant", "content": "Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.154? (Ex2)"}, {"role": "assistant", "content": "Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.154."}, {"role": "assistant", "content": "Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02.155? (Ex3)"}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-02.155."}, {"role": "assistant", "content": "Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.156? (Ex1)"}, {"role": "assistant", "content": "Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.156."}, {"role": "assistant", "content": "Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.157? (Ex2)"}, {"role": "assistant", "content": "Perform threat hunting to look for signs of threat actors within the environment"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.157."}, {"role": "assistant", "content": "Perform threat hunting to look for signs of threat actors within the environment"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03.158? (Ex3)"}, {"role": "assistant", "content": "Implement processes for identifying internal threat actors"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-03.158."}, {"role": "assistant", "content": "Implement processes for identifying internal threat actors"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.159? (Ex1)"}, {"role": "assistant", "content": "Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.159."}, {"role": "assistant", "content": "Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.160? (Ex2)"}, {"role": "assistant", "content": "Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.160."}, {"role": "assistant", "content": "Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04.161? (Ex3)"}, {"role": "assistant", "content": "Account for the potential impacts of cascading failures for systems of systems"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-04.161."}, {"role": "assistant", "content": "Account for the potential impacts of cascading failures for systems of systems"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05.162? (Ex1)"}, {"role": "assistant", "content": "Develop threat models to better understand risks to the data and identify appropriate risk responses"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-05.162."}, {"role": "assistant", "content": "Develop threat models to better understand risks to the data and identify appropriate risk responses"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05.163? (Ex2)"}, {"role": "assistant", "content": "Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-05.163."}, {"role": "assistant", "content": "Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.164? (Ex1)"}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.164."}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.165? (Ex2)"}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.165."}, {"role": "assistant", "content": "Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.166? (Ex3)"}, {"role": "assistant", "content": "Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.166."}, {"role": "assistant", "content": "Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.167? (Ex4)"}, {"role": "assistant", "content": "Use risk assessment findings to inform risk response decisions and actions"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.167."}, {"role": "assistant", "content": "Use risk assessment findings to inform risk response decisions and actions"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06.168? (Ex5)"}, {"role": "assistant", "content": "Communicate planned risk responses to affected stakeholders in priority order"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-06.168."}, {"role": "assistant", "content": "Communicate planned risk responses to affected stakeholders in priority order"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.169? (Ex1)"}, {"role": "assistant", "content": "Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.169."}, {"role": "assistant", "content": "Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.170? (Ex2)"}, {"role": "assistant", "content": "Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.170."}, {"role": "assistant", "content": "Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.171? (Ex3)"}, {"role": "assistant", "content": "Document the risks related to each requested exception and the plan for responding to those risks"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.171."}, {"role": "assistant", "content": "Document the risks related to each requested exception and the plan for responding to those risks"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07.172? (Ex4)"}, {"role": "assistant", "content": "Periodically review risks that were accepted based upon planned future actions or milestones"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-07.172."}, {"role": "assistant", "content": "Periodically review risks that were accepted based upon planned future actions or milestones"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08.173? (Ex1)"}, {"role": "assistant", "content": "Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-08.173."}, {"role": "assistant", "content": "Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08.174? (Ex2)"}, {"role": "assistant", "content": "Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-08.174."}, {"role": "assistant", "content": "Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations"}]} {"messages": [{"role": "user", "content": "What is ID.RA-09.175? (Ex1)"}, {"role": "assistant", "content": "Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-09.175."}, {"role": "assistant", "content": "Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is ID.RA-10.176? (Ex1)"}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain"}]} {"messages": [{"role": "user", "content": "Explain ID.RA-10.176."}, {"role": "assistant", "content": "Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.177? (Ex1)"}, {"role": "assistant", "content": "Perform self-assessments of critical services that take current threats and TTPs into consideration"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.177."}, {"role": "assistant", "content": "Perform self-assessments of critical services that take current threats and TTPs into consideration"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.178? (Ex2)"}, {"role": "assistant", "content": "Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.178."}, {"role": "assistant", "content": "Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01.179? (Ex3)"}, {"role": "assistant", "content": "Constantly evaluate compliance with selected cybersecurity requirements through automated means"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-01.179."}, {"role": "assistant", "content": "Constantly evaluate compliance with selected cybersecurity requirements through automated means"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.180? (Ex1)"}, {"role": "assistant", "content": "Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.180."}, {"role": "assistant", "content": "Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.181? (Ex2)"}, {"role": "assistant", "content": "Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.181."}, {"role": "assistant", "content": "Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.182? (Ex3)"}, {"role": "assistant", "content": "Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.182."}, {"role": "assistant", "content": "Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.183? (Ex4)"}, {"role": "assistant", "content": "Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.183."}, {"role": "assistant", "content": "Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.184? (Ex5)"}, {"role": "assistant", "content": "Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.184."}, {"role": "assistant", "content": "Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02.185? (Ex6)"}, {"role": "assistant", "content": "Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-02.185."}, {"role": "assistant", "content": "Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.186? (Ex1)"}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with suppliers"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.186."}, {"role": "assistant", "content": "Conduct collaborative lessons learned sessions with suppliers"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.187? (Ex2)"}, {"role": "assistant", "content": "Annually review cybersecurity policies, processes, and procedures to take lessons learned into account"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.187."}, {"role": "assistant", "content": "Annually review cybersecurity policies, processes, and procedures to take lessons learned into account"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03.188? (Ex3)"}, {"role": "assistant", "content": "Use metrics to assess operational cybersecurity performance over time"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-03.188."}, {"role": "assistant", "content": "Use metrics to assess operational cybersecurity performance over time"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.189? (Ex1)"}, {"role": "assistant", "content": "Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.189."}, {"role": "assistant", "content": "Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.190? (Ex2)"}, {"role": "assistant", "content": "Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.190."}, {"role": "assistant", "content": "Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.191? (Ex3)"}, {"role": "assistant", "content": "Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.191."}, {"role": "assistant", "content": "Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.192? (Ex4)"}, {"role": "assistant", "content": "Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.192."}, {"role": "assistant", "content": "Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04.193? (Ex5)"}, {"role": "assistant", "content": "Review and update all cybersecurity plans annually or when a need for significant improvements is identified"}]} {"messages": [{"role": "user", "content": "Explain ID.IM-04.193."}, {"role": "assistant", "content": "Review and update all cybersecurity plans annually or when a need for significant improvements is identified"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.194? (Ex1)"}, {"role": "assistant", "content": "Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.194."}, {"role": "assistant", "content": "Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.195? (Ex2)"}, {"role": "assistant", "content": "Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.195."}, {"role": "assistant", "content": "Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.196? (Ex3)"}, {"role": "assistant", "content": "Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.196."}, {"role": "assistant", "content": "Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01.197? (Ex4)"}, {"role": "assistant", "content": "Physically label authorized hardware with an identifier for inventory and servicing purposes"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-01.197."}, {"role": "assistant", "content": "Physically label authorized hardware with an identifier for inventory and servicing purposes"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02.198? (Ex1)"}, {"role": "assistant", "content": "Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-02.198."}, {"role": "assistant", "content": "Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02.199? (Ex2)"}, {"role": "assistant", "content": "Issue a different credential for each person (i.e., no credential sharing)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-02.199."}, {"role": "assistant", "content": "Issue a different credential for each person (i.e., no credential sharing)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.200? (Ex1)"}, {"role": "assistant", "content": "Require multifactor authentication"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.200."}, {"role": "assistant", "content": "Require multifactor authentication"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.201? (Ex2)"}, {"role": "assistant", "content": "Enforce policies for the minimum strength of passwords, PINs, and similar authenticators"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.201."}, {"role": "assistant", "content": "Enforce policies for the minimum strength of passwords, PINs, and similar authenticators"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.202? (Ex3)"}, {"role": "assistant", "content": "Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.202."}, {"role": "assistant", "content": "Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03.203? (Ex4)"}, {"role": "assistant", "content": "Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-03.203."}, {"role": "assistant", "content": "Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.204? (Ex1)"}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information through single sign-on systems"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.204."}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information through single sign-on systems"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.205? (Ex2)"}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information between federated systems"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.205."}, {"role": "assistant", "content": "Protect identity assertions that are used to convey authentication and user information between federated systems"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04.206? (Ex3)"}, {"role": "assistant", "content": "Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-04.206."}, {"role": "assistant", "content": "Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.207? (Ex1)"}, {"role": "assistant", "content": "Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.207."}, {"role": "assistant", "content": "Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.208? (Ex2)"}, {"role": "assistant", "content": "Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.208."}, {"role": "assistant", "content": "Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.209? (Ex3)"}, {"role": "assistant", "content": "Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.209."}, {"role": "assistant", "content": "Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05.210? (Ex4)"}, {"role": "assistant", "content": "Periodically review the privileges associated with critical business functions to confirm proper separation of duties"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-05.210."}, {"role": "assistant", "content": "Periodically review the privileges associated with critical business functions to confirm proper separation of duties"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.211? (Ex1)"}, {"role": "assistant", "content": "Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.211."}, {"role": "assistant", "content": "Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.212? (Ex2)"}, {"role": "assistant", "content": "Employ additional physical security controls for areas that contain high-risk assets"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.212."}, {"role": "assistant", "content": "Employ additional physical security controls for areas that contain high-risk assets"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06.213? (Ex3)"}, {"role": "assistant", "content": "Escort guests, vendors, and other third parties within areas that contain business-critical assets"}]} {"messages": [{"role": "user", "content": "Explain PR.AA-06.213."}, {"role": "assistant", "content": "Escort guests, vendors, and other third parties within areas that contain business-critical assets"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.214? (Ex1)"}, {"role": "assistant", "content": "Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.214."}, {"role": "assistant", "content": "Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.215? (Ex2)"}, {"role": "assistant", "content": "Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.215."}, {"role": "assistant", "content": "Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.216? (Ex3)"}, {"role": "assistant", "content": "Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.216."}, {"role": "assistant", "content": "Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.217? (Ex4)"}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of basic cybersecurity practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.217."}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of basic cybersecurity practices"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01.218? (Ex5)"}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-01.218."}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.219? (Ex1)"}, {"role": "assistant", "content": "Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.219."}, {"role": "assistant", "content": "Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.220? (Ex2)"}, {"role": "assistant", "content": "Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.220."}, {"role": "assistant", "content": "Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.221? (Ex3)"}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.221."}, {"role": "assistant", "content": "Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02.222? (Ex4)"}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "Explain PR.AT-02.222."}, {"role": "assistant", "content": "Require annual refreshers to reinforce existing practices and introduce new practices"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.223? (Ex1)"}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.223."}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.224? (Ex2)"}, {"role": "assistant", "content": "Use full disk encryption to protect data stored on user endpoints"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.224."}, {"role": "assistant", "content": "Use full disk encryption to protect data stored on user endpoints"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.225? (Ex3)"}, {"role": "assistant", "content": "Confirm the integrity of software by validating signatures"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.225."}, {"role": "assistant", "content": "Confirm the integrity of software by validating signatures"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.226? (Ex4)"}, {"role": "assistant", "content": "Restrict the use of removable media to prevent data exfiltration"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.226."}, {"role": "assistant", "content": "Restrict the use of removable media to prevent data exfiltration"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01.227? (Ex5)"}, {"role": "assistant", "content": "Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-01.227."}, {"role": "assistant", "content": "Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.228? (Ex1)"}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.228."}, {"role": "assistant", "content": "Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.229? (Ex2)"}, {"role": "assistant", "content": "Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.229."}, {"role": "assistant", "content": "Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.230? (Ex3)"}, {"role": "assistant", "content": "Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.230."}, {"role": "assistant", "content": "Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02.231? (Ex4)"}, {"role": "assistant", "content": "Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-02.231."}, {"role": "assistant", "content": "Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10.232? (Ex1)"}, {"role": "assistant", "content": "Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-10.232."}, {"role": "assistant", "content": "Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10.233? (Ex2)"}, {"role": "assistant", "content": "Protect data in use from access by other users and processes of the same platform"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-10.233."}, {"role": "assistant", "content": "Protect data in use from access by other users and processes of the same platform"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.234? (Ex1)"}, {"role": "assistant", "content": "Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.234."}, {"role": "assistant", "content": "Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.235? (Ex2)"}, {"role": "assistant", "content": "Test backups and restores for all types of data sources at least annually"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.235."}, {"role": "assistant", "content": "Test backups and restores for all types of data sources at least annually"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.236? (Ex3)"}, {"role": "assistant", "content": "Securely store some backups offline and offsite so that an incident or disaster will not damage them"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.236."}, {"role": "assistant", "content": "Securely store some backups offline and offsite so that an incident or disaster will not damage them"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11.237? (Ex4)"}, {"role": "assistant", "content": "Enforce geographic separation and geolocation restrictions for data backup storage"}]} {"messages": [{"role": "user", "content": "Explain PR.DS-11.237."}, {"role": "assistant", "content": "Enforce geographic separation and geolocation restrictions for data backup storage"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.238? (Ex1)"}, {"role": "assistant", "content": "Establish, test, deploy, and maintain hardened baselines that enforce the organization's cybersecurity policies and provide only essential capabilities (i.e., principle of least functionality)"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.238."}, {"role": "assistant", "content": "Establish, test, deploy, and maintain hardened baselines that enforce the organization's cybersecurity policies and provide only essential capabilities (i.e., principle of least functionality)"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.239? (Ex2)"}, {"role": "assistant", "content": "Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.239."}, {"role": "assistant", "content": "Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01.240? (Ex3)"}, {"role": "assistant", "content": "Monitor implemented software for deviations from approved baselines"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-01.240."}, {"role": "assistant", "content": "Monitor implemented software for deviations from approved baselines"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.241? (Ex1)"}, {"role": "assistant", "content": "Perform routine and emergency patching within the timeframes specified in the vulnerability management plan"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.241."}, {"role": "assistant", "content": "Perform routine and emergency patching within the timeframes specified in the vulnerability management plan"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.242? (Ex2)"}, {"role": "assistant", "content": "Update container images, and deploy new container instances to replace rather than update existing instances"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.242."}, {"role": "assistant", "content": "Update container images, and deploy new container instances to replace rather than update existing instances"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.243? (Ex3)"}, {"role": "assistant", "content": "Replace end-of-life software and service versions with supported, maintained versions"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.243."}, {"role": "assistant", "content": "Replace end-of-life software and service versions with supported, maintained versions"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.244? (Ex4)"}, {"role": "assistant", "content": "Uninstall and remove unauthorized software and services that pose undue risks"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.244."}, {"role": "assistant", "content": "Uninstall and remove unauthorized software and services that pose undue risks"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.245? (Ex5)"}, {"role": "assistant", "content": "Uninstall and remove any unnecessary software components (e.g., operating system utilities) that attackers might misuse"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.245."}, {"role": "assistant", "content": "Uninstall and remove any unnecessary software components (e.g., operating system utilities) that attackers might misuse"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02.246? (Ex6)"}, {"role": "assistant", "content": "Define and implement plans for software and service end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-02.246."}, {"role": "assistant", "content": "Define and implement plans for software and service end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.247? (Ex1)"}, {"role": "assistant", "content": "Replace hardware when it lacks needed security capabilities or when it cannot support software with needed security capabilities"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.247."}, {"role": "assistant", "content": "Replace hardware when it lacks needed security capabilities or when it cannot support software with needed security capabilities"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.248? (Ex2)"}, {"role": "assistant", "content": "Define and implement plans for hardware end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.248."}, {"role": "assistant", "content": "Define and implement plans for hardware end-of-life maintenance support and obsolescence"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03.249? (Ex3)"}, {"role": "assistant", "content": "Perform hardware disposal in a secure, responsible, and auditable manner"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-03.249."}, {"role": "assistant", "content": "Perform hardware disposal in a secure, responsible, and auditable manner"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.250? (Ex1)"}, {"role": "assistant", "content": "Configure all operating systems, applications, and services (including cloud-based services) to generate log records"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.250."}, {"role": "assistant", "content": "Configure all operating systems, applications, and services (including cloud-based services) to generate log records"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.251? (Ex2)"}, {"role": "assistant", "content": "Configure log generators to securely share their logs with the organization's logging infrastructure systems and services"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.251."}, {"role": "assistant", "content": "Configure log generators to securely share their logs with the organization's logging infrastructure systems and services"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04.252? (Ex3)"}, {"role": "assistant", "content": "Configure log generators to record the data needed by zero-trust architectures"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-04.252."}, {"role": "assistant", "content": "Configure log generators to record the data needed by zero-trust architectures"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.253? (Ex1)"}, {"role": "assistant", "content": "When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.253."}, {"role": "assistant", "content": "When risk warrants it, restrict software execution to permitted products only or deny the execution of prohibited and unauthorized software"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.254? (Ex2)"}, {"role": "assistant", "content": "Verify the source of new software and the software's integrity before installing it"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.254."}, {"role": "assistant", "content": "Verify the source of new software and the software's integrity before installing it"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.255? (Ex3)"}, {"role": "assistant", "content": "Configure platforms to use only approved DNS services that block access to known malicious domains"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.255."}, {"role": "assistant", "content": "Configure platforms to use only approved DNS services that block access to known malicious domains"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05.256? (Ex4)"}, {"role": "assistant", "content": "Configure platforms to allow the installation of organization-approved software only"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-05.256."}, {"role": "assistant", "content": "Configure platforms to allow the installation of organization-approved software only"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.257? (Ex1)"}, {"role": "assistant", "content": "Protect all components of organization-developed software from tampering and unauthorized access"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.257."}, {"role": "assistant", "content": "Protect all components of organization-developed software from tampering and unauthorized access"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.258? (Ex2)"}, {"role": "assistant", "content": "Secure all software produced by the organization, with minimal vulnerabilities in their releases"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.258."}, {"role": "assistant", "content": "Secure all software produced by the organization, with minimal vulnerabilities in their releases"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06.259? (Ex3)"}, {"role": "assistant", "content": "Maintain the software used in production environments, and securely dispose of software once it is no longer needed"}]} {"messages": [{"role": "user", "content": "Explain PR.PS-06.259."}, {"role": "assistant", "content": "Maintain the software used in production environments, and securely dispose of software once it is no longer needed"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.260? (Ex1)"}, {"role": "assistant", "content": "Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e.g., IT, IoT, OT, mobile, guests), and permit required communications only between segments"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.260."}, {"role": "assistant", "content": "Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e.g., IT, IoT, OT, mobile, guests), and permit required communications only between segments"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.261? (Ex2)"}, {"role": "assistant", "content": "Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.261."}, {"role": "assistant", "content": "Logically segment organization networks from external networks, and permit only necessary communications to enter the organization's networks from the external networks"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.262? (Ex3)"}, {"role": "assistant", "content": "Implement zero trust architectures to restrict network access to each resource to the minimum necessary"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.262."}, {"role": "assistant", "content": "Implement zero trust architectures to restrict network access to each resource to the minimum necessary"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01.263? (Ex4)"}, {"role": "assistant", "content": "Check the cyber health of endpoints before allowing them to access and use production resources"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-01.263."}, {"role": "assistant", "content": "Check the cyber health of endpoints before allowing them to access and use production resources"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02.264? (Ex1)"}, {"role": "assistant", "content": "Protect organizational equipment from known environmental threats, such as flooding, fire, wind, and excessive heat and humidity"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-02.264."}, {"role": "assistant", "content": "Protect organizational equipment from known environmental threats, such as flooding, fire, wind, and excessive heat and humidity"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02.265? (Ex2)"}, {"role": "assistant", "content": "Include protection from environmental threats and provisions for adequate operating infrastructure in requirements for service providers that operate systems on the organization's behalf"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-02.265."}, {"role": "assistant", "content": "Include protection from environmental threats and provisions for adequate operating infrastructure in requirements for service providers that operate systems on the organization's behalf"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.266? (Ex1)"}, {"role": "assistant", "content": "Avoid single points of failure in systems and infrastructure"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.266."}, {"role": "assistant", "content": "Avoid single points of failure in systems and infrastructure"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.267? (Ex2)"}, {"role": "assistant", "content": "Use load balancing to increase capacity and improve reliability"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.267."}, {"role": "assistant", "content": "Use load balancing to increase capacity and improve reliability"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03.268? (Ex3)"}, {"role": "assistant", "content": "Use high-availability components like redundant storage and power supplies to improve system reliability"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-03.268."}, {"role": "assistant", "content": "Use high-availability components like redundant storage and power supplies to improve system reliability"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04.269? (Ex1)"}, {"role": "assistant", "content": "Monitor usage of storage, power, compute, network bandwidth, and other resources"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-04.269."}, {"role": "assistant", "content": "Monitor usage of storage, power, compute, network bandwidth, and other resources"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04.270? (Ex2)"}, {"role": "assistant", "content": "Forecast future needs, and scale resources accordingly"}]} {"messages": [{"role": "user", "content": "Explain PR.IR-04.270."}, {"role": "assistant", "content": "Forecast future needs, and scale resources accordingly"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.271? (Ex1)"}, {"role": "assistant", "content": "Monitor DNS, BGP, and other network services for adverse events"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.271."}, {"role": "assistant", "content": "Monitor DNS, BGP, and other network services for adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.272? (Ex2)"}, {"role": "assistant", "content": "Monitor wired and wireless networks for connections from unauthorized endpoints"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.272."}, {"role": "assistant", "content": "Monitor wired and wireless networks for connections from unauthorized endpoints"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.273? (Ex3)"}, {"role": "assistant", "content": "Monitor facilities for unauthorized or rogue wireless networks"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.273."}, {"role": "assistant", "content": "Monitor facilities for unauthorized or rogue wireless networks"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.274? (Ex4)"}, {"role": "assistant", "content": "Compare actual network flows against baselines to detect deviations"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.274."}, {"role": "assistant", "content": "Compare actual network flows against baselines to detect deviations"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01.275? (Ex5)"}, {"role": "assistant", "content": "Monitor network communications to identify changes in security postures for zero trust purposes"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-01.275."}, {"role": "assistant", "content": "Monitor network communications to identify changes in security postures for zero trust purposes"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.276? (Ex1)"}, {"role": "assistant", "content": "Monitor logs from physical access control systems (e.g., badge readers) to find unusual access patterns (e.g., deviations from the norm) and failed access attempts"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.276."}, {"role": "assistant", "content": "Monitor logs from physical access control systems (e.g., badge readers) to find unusual access patterns (e.g., deviations from the norm) and failed access attempts"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.277? (Ex2)"}, {"role": "assistant", "content": "Review and monitor physical access records (e.g., from visitor registration, sign-in sheets)"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.277."}, {"role": "assistant", "content": "Review and monitor physical access records (e.g., from visitor registration, sign-in sheets)"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.278? (Ex3)"}, {"role": "assistant", "content": "Monitor physical access controls (e.g., locks, latches, hinge pins, alarms) for signs of tampering"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.278."}, {"role": "assistant", "content": "Monitor physical access controls (e.g., locks, latches, hinge pins, alarms) for signs of tampering"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02.279? (Ex4)"}, {"role": "assistant", "content": "Monitor the physical environment using alarm systems, cameras, and security guards"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-02.279."}, {"role": "assistant", "content": "Monitor the physical environment using alarm systems, cameras, and security guards"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.280? (Ex1)"}, {"role": "assistant", "content": "Use behavior analytics software to detect anomalous user activity to mitigate insider threats"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.280."}, {"role": "assistant", "content": "Use behavior analytics software to detect anomalous user activity to mitigate insider threats"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.281? (Ex2)"}, {"role": "assistant", "content": "Monitor logs from logical access control systems to find unusual access patterns and failed access attempts"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.281."}, {"role": "assistant", "content": "Monitor logs from logical access control systems to find unusual access patterns and failed access attempts"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03.282? (Ex3)"}, {"role": "assistant", "content": "Continuously monitor deception technology, including user accounts, for any usage"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-03.282."}, {"role": "assistant", "content": "Continuously monitor deception technology, including user accounts, for any usage"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06.283? (Ex1)"}, {"role": "assistant", "content": "Monitor remote and onsite administration and maintenance activities that external providers perform on organizational systems"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-06.283."}, {"role": "assistant", "content": "Monitor remote and onsite administration and maintenance activities that external providers perform on organizational systems"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06.284? (Ex2)"}, {"role": "assistant", "content": "Monitor activity from cloud-based services, internet service providers, and other service providers for deviations from expected behavior"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-06.284."}, {"role": "assistant", "content": "Monitor activity from cloud-based services, internet service providers, and other service providers for deviations from expected behavior"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.285? (Ex1)"}, {"role": "assistant", "content": "Monitor email, web, file sharing, collaboration services, and other common attack vectors to detect malware, phishing, data leaks and exfiltration, and other adverse events"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.285."}, {"role": "assistant", "content": "Monitor email, web, file sharing, collaboration services, and other common attack vectors to detect malware, phishing, data leaks and exfiltration, and other adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.286? (Ex2)"}, {"role": "assistant", "content": "Monitor authentication attempts to identify attacks against credentials and unauthorized credential reuse"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.286."}, {"role": "assistant", "content": "Monitor authentication attempts to identify attacks against credentials and unauthorized credential reuse"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.287? (Ex3)"}, {"role": "assistant", "content": "Monitor software configurations for deviations from security baselines"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.287."}, {"role": "assistant", "content": "Monitor software configurations for deviations from security baselines"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.288? (Ex4)"}, {"role": "assistant", "content": "Monitor hardware and software for signs of tampering"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.288."}, {"role": "assistant", "content": "Monitor hardware and software for signs of tampering"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09.289? (Ex5)"}, {"role": "assistant", "content": "Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized"}]} {"messages": [{"role": "user", "content": "Explain DE.CM-09.289."}, {"role": "assistant", "content": "Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.290? (Ex1)"}, {"role": "assistant", "content": "Use security information and event management (SIEM) or other tools to continuously monitor log events for known malicious and suspicious activity"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.290."}, {"role": "assistant", "content": "Use security information and event management (SIEM) or other tools to continuously monitor log events for known malicious and suspicious activity"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.291? (Ex2)"}, {"role": "assistant", "content": "Utilize up-to-date cyber threat intelligence in log analysis tools to improve detection accuracy and characterize threat actors, their methods, and indicators of compromise"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.291."}, {"role": "assistant", "content": "Utilize up-to-date cyber threat intelligence in log analysis tools to improve detection accuracy and characterize threat actors, their methods, and indicators of compromise"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.292? (Ex3)"}, {"role": "assistant", "content": "Regularly conduct manual reviews of log events for technologies that cannot be sufficiently monitored through automation"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.292."}, {"role": "assistant", "content": "Regularly conduct manual reviews of log events for technologies that cannot be sufficiently monitored through automation"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02.293? (Ex4)"}, {"role": "assistant", "content": "Use log analysis tools to generate reports on their findings"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-02.293."}, {"role": "assistant", "content": "Use log analysis tools to generate reports on their findings"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.294? (Ex1)"}, {"role": "assistant", "content": "Constantly transfer log data generated by other sources to a relatively small number of log servers"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.294."}, {"role": "assistant", "content": "Constantly transfer log data generated by other sources to a relatively small number of log servers"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.295? (Ex2)"}, {"role": "assistant", "content": "Use event correlation technology (e.g., SIEM) to collect information captured by multiple sources"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.295."}, {"role": "assistant", "content": "Use event correlation technology (e.g., SIEM) to collect information captured by multiple sources"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03.296? (Ex3)"}, {"role": "assistant", "content": "Utilize cyber threat intelligence to help correlate events among log sources"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-03.296."}, {"role": "assistant", "content": "Utilize cyber threat intelligence to help correlate events among log sources"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04.297? (Ex1)"}, {"role": "assistant", "content": "Use SIEMs or other tools to estimate impact and scope, and review and refine the estimates"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-04.297."}, {"role": "assistant", "content": "Use SIEMs or other tools to estimate impact and scope, and review and refine the estimates"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04.298? (Ex2)"}, {"role": "assistant", "content": "A person creates their own estimates of impact and scope"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-04.298."}, {"role": "assistant", "content": "A person creates their own estimates of impact and scope"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.299? (Ex1)"}, {"role": "assistant", "content": "Use cybersecurity software to generate alerts and provide them to the security operations center (SOC), incident responders, and incident response tools"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.299."}, {"role": "assistant", "content": "Use cybersecurity software to generate alerts and provide them to the security operations center (SOC), incident responders, and incident response tools"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.300? (Ex2)"}, {"role": "assistant", "content": "Incident responders and other authorized personnel can access log analysis findings at all times"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.300."}, {"role": "assistant", "content": "Incident responders and other authorized personnel can access log analysis findings at all times"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.301? (Ex3)"}, {"role": "assistant", "content": "Automatically create and assign tickets in the organization's ticketing system when certain types of alerts occur"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.301."}, {"role": "assistant", "content": "Automatically create and assign tickets in the organization's ticketing system when certain types of alerts occur"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06.302? (Ex4)"}, {"role": "assistant", "content": "Manually create and assign tickets in the organization's ticketing system when technical staff discover indicators of compromise"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-06.302."}, {"role": "assistant", "content": "Manually create and assign tickets in the organization's ticketing system when technical staff discover indicators of compromise"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.303? (Ex1)"}, {"role": "assistant", "content": "Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.303."}, {"role": "assistant", "content": "Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.304? (Ex2)"}, {"role": "assistant", "content": "Securely provide information from asset inventories to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.304."}, {"role": "assistant", "content": "Securely provide information from asset inventories to detection technologies, processes, and personnel"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07.305? (Ex3)"}, {"role": "assistant", "content": "Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-07.305."}, {"role": "assistant", "content": "Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08.306? (Ex1)"}, {"role": "assistant", "content": "Apply incident criteria to known and assumed characteristics of activity in order to determine whether an incident should be declared"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-08.306."}, {"role": "assistant", "content": "Apply incident criteria to known and assumed characteristics of activity in order to determine whether an incident should be declared"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08.307? (Ex2)"}, {"role": "assistant", "content": "Take known false positives into account when applying incident criteria"}]} {"messages": [{"role": "user", "content": "Explain DE.AE-08.307."}, {"role": "assistant", "content": "Take known false positives into account when applying incident criteria"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.308? (Ex1)"}, {"role": "assistant", "content": "Detection technologies automatically report confirmed incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.308."}, {"role": "assistant", "content": "Detection technologies automatically report confirmed incidents"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.309? (Ex2)"}, {"role": "assistant", "content": "Request incident response assistance from the organization's incident response outsourcer"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.309."}, {"role": "assistant", "content": "Request incident response assistance from the organization's incident response outsourcer"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.310? (Ex3)"}, {"role": "assistant", "content": "Designate an incident lead for each incident"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.310."}, {"role": "assistant", "content": "Designate an incident lead for each incident"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01.311? (Ex4)"}, {"role": "assistant", "content": "Initiate execution of additional cybersecurity plans as needed to support incident response (for example, business continuity and disaster recovery)"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-01.311."}, {"role": "assistant", "content": "Initiate execution of additional cybersecurity plans as needed to support incident response (for example, business continuity and disaster recovery)"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02.312? (Ex1)"}, {"role": "assistant", "content": "Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-02.312."}, {"role": "assistant", "content": "Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02.313? (Ex2)"}, {"role": "assistant", "content": "Apply criteria to estimate the severity of an incident"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-02.313."}, {"role": "assistant", "content": "Apply criteria to estimate the severity of an incident"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.314? (Ex1)"}, {"role": "assistant", "content": "Further review and categorize incidents based on the type of incident (e.g., data breach, ransomware, DDoS, account compromise)"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.314."}, {"role": "assistant", "content": "Further review and categorize incidents based on the type of incident (e.g., data breach, ransomware, DDoS, account compromise)"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.315? (Ex2)"}, {"role": "assistant", "content": "Prioritize incidents based on their scope, likely impact, and time-critical nature"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.315."}, {"role": "assistant", "content": "Prioritize incidents based on their scope, likely impact, and time-critical nature"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03.316? (Ex3)"}, {"role": "assistant", "content": "Select incident response strategies for active incidents by balancing the need to quickly recover from an incident with the need to observe the attacker or conduct a more thorough investigation"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-03.316."}, {"role": "assistant", "content": "Select incident response strategies for active incidents by balancing the need to quickly recover from an incident with the need to observe the attacker or conduct a more thorough investigation"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04.317? (Ex1)"}, {"role": "assistant", "content": "Track and validate the status of all ongoing incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-04.317."}, {"role": "assistant", "content": "Track and validate the status of all ongoing incidents"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04.318? (Ex2)"}, {"role": "assistant", "content": "Coordinate incident escalation or elevation with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-04.318."}, {"role": "assistant", "content": "Coordinate incident escalation or elevation with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05.319? (Ex1)"}, {"role": "assistant", "content": "Apply incident recovery criteria to known and assumed characteristics of the incident to determine whether incident recovery processes should be initiated"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-05.319."}, {"role": "assistant", "content": "Apply incident recovery criteria to known and assumed characteristics of the incident to determine whether incident recovery processes should be initiated"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05.320? (Ex2)"}, {"role": "assistant", "content": "Take the possible operational disruption of incident recovery activities into account"}]} {"messages": [{"role": "user", "content": "Explain RS.MA-05.320."}, {"role": "assistant", "content": "Take the possible operational disruption of incident recovery activities into account"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.321? (Ex1)"}, {"role": "assistant", "content": "Determine the sequence of events that occurred during the incident and which assets and resources were involved in each event"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.321."}, {"role": "assistant", "content": "Determine the sequence of events that occurred during the incident and which assets and resources were involved in each event"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.322? (Ex2)"}, {"role": "assistant", "content": "Attempt to determine what vulnerabilities, threats, and threat actors were directly or indirectly involved in the incident"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.322."}, {"role": "assistant", "content": "Attempt to determine what vulnerabilities, threats, and threat actors were directly or indirectly involved in the incident"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.323? (Ex3)"}, {"role": "assistant", "content": "Analyze the incident to find the underlying, systemic root causes"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.323."}, {"role": "assistant", "content": "Analyze the incident to find the underlying, systemic root causes"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03.324? (Ex4)"}, {"role": "assistant", "content": "Check any cyber deception technology for additional information on attacker behavior"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-03.324."}, {"role": "assistant", "content": "Check any cyber deception technology for additional information on attacker behavior"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06.325? (Ex1)"}, {"role": "assistant", "content": "Require each incident responder and others (e.g., system administrators, cybersecurity engineers) who perform incident response tasks to record their actions and make the record immutable"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-06.325."}, {"role": "assistant", "content": "Require each incident responder and others (e.g., system administrators, cybersecurity engineers) who perform incident response tasks to record their actions and make the record immutable"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06.326? (Ex2)"}, {"role": "assistant", "content": "Require the incident lead to document the incident in detail and be responsible for preserving the integrity of the documentation and the sources of all information being reported"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-06.326."}, {"role": "assistant", "content": "Require the incident lead to document the incident in detail and be responsible for preserving the integrity of the documentation and the sources of all information being reported"}]} {"messages": [{"role": "user", "content": "What is RS.AN-07.327? (Ex1)"}, {"role": "assistant", "content": "Collect, preserve, and safeguard the integrity of all pertinent incident data and metadata (e.g., data source, date/time of collection) based on evidence preservation and chain-of-custody procedures"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-07.327."}, {"role": "assistant", "content": "Collect, preserve, and safeguard the integrity of all pertinent incident data and metadata (e.g., data source, date/time of collection) based on evidence preservation and chain-of-custody procedures"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08.328? (Ex1)"}, {"role": "assistant", "content": "Review other potential targets of the incident to search for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-08.328."}, {"role": "assistant", "content": "Review other potential targets of the incident to search for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08.329? (Ex2)"}, {"role": "assistant", "content": "Automatically run tools on targets to look for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "Explain RS.AN-08.329."}, {"role": "assistant", "content": "Automatically run tools on targets to look for indicators of compromise and evidence of persistence"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.330? (Ex1)"}, {"role": "assistant", "content": "Follow the organization's breach notification procedures after discovering a data breach incident, including notifying affected customers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.330."}, {"role": "assistant", "content": "Follow the organization's breach notification procedures after discovering a data breach incident, including notifying affected customers"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.331? (Ex2)"}, {"role": "assistant", "content": "Notify business partners and customers of incidents in accordance with contractual requirements"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.331."}, {"role": "assistant", "content": "Notify business partners and customers of incidents in accordance with contractual requirements"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02.332? (Ex3)"}, {"role": "assistant", "content": "Notify law enforcement agencies and regulatory bodies of incidents based on criteria in the incident response plan and management approval"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-02.332."}, {"role": "assistant", "content": "Notify law enforcement agencies and regulatory bodies of incidents based on criteria in the incident response plan and management approval"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.333? (Ex1)"}, {"role": "assistant", "content": "Securely share information consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.333."}, {"role": "assistant", "content": "Securely share information consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.334? (Ex2)"}, {"role": "assistant", "content": "Voluntarily share information about an attacker's observed TTPs, with all sensitive data removed, with an Information Sharing and Analysis Center (ISAC)"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.334."}, {"role": "assistant", "content": "Voluntarily share information about an attacker's observed TTPs, with all sensitive data removed, with an Information Sharing and Analysis Center (ISAC)"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.335? (Ex3)"}, {"role": "assistant", "content": "Notify HR when malicious insider activity occurs"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.335."}, {"role": "assistant", "content": "Notify HR when malicious insider activity occurs"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.336? (Ex4)"}, {"role": "assistant", "content": "Regularly update senior leadership on the status of major incidents"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.336."}, {"role": "assistant", "content": "Regularly update senior leadership on the status of major incidents"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.337? (Ex5)"}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.337."}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03.338? (Ex6)"}, {"role": "assistant", "content": "Coordinate crisis communication methods between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain RS.CO-03.338."}, {"role": "assistant", "content": "Coordinate crisis communication methods between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.339? (Ex1)"}, {"role": "assistant", "content": "Cybersecurity technologies (e.g., antivirus software) and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform containment actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.339."}, {"role": "assistant", "content": "Cybersecurity technologies (e.g., antivirus software) and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform containment actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.340? (Ex2)"}, {"role": "assistant", "content": "Allow incident responders to manually select and perform containment actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.340."}, {"role": "assistant", "content": "Allow incident responders to manually select and perform containment actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.341? (Ex3)"}, {"role": "assistant", "content": "Allow a third party (e.g., internet service provider, managed security service provider) to perform containment actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.341."}, {"role": "assistant", "content": "Allow a third party (e.g., internet service provider, managed security service provider) to perform containment actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01.342? (Ex4)"}, {"role": "assistant", "content": "Automatically transfer compromised endpoints to a remediation virtual local area network (VLAN)"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-01.342."}, {"role": "assistant", "content": "Automatically transfer compromised endpoints to a remediation virtual local area network (VLAN)"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.343? (Ex1)"}, {"role": "assistant", "content": "Cybersecurity technologies and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform eradication actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.343."}, {"role": "assistant", "content": "Cybersecurity technologies and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform eradication actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.344? (Ex2)"}, {"role": "assistant", "content": "Allow incident responders to manually select and perform eradication actions"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.344."}, {"role": "assistant", "content": "Allow incident responders to manually select and perform eradication actions"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02.345? (Ex3)"}, {"role": "assistant", "content": "Allow a third party (e.g., managed security service provider) to perform eradication actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "Explain RS.MI-02.345."}, {"role": "assistant", "content": "Allow a third party (e.g., managed security service provider) to perform eradication actions on behalf of the organization"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01.346? (Ex1)"}, {"role": "assistant", "content": "Begin recovery procedures during or after incident response processes"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-01.346."}, {"role": "assistant", "content": "Begin recovery procedures during or after incident response processes"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01.347? (Ex2)"}, {"role": "assistant", "content": "Make all individuals with recovery responsibilities aware of the plans for recovery and the authorizations required to implement each aspect of the plans"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-01.347."}, {"role": "assistant", "content": "Make all individuals with recovery responsibilities aware of the plans for recovery and the authorizations required to implement each aspect of the plans"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02.348? (Ex1)"}, {"role": "assistant", "content": "Select recovery actions based on the criteria defined in the incident response plan and available resources"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-02.348."}, {"role": "assistant", "content": "Select recovery actions based on the criteria defined in the incident response plan and available resources"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02.349? (Ex2)"}, {"role": "assistant", "content": "Change planned recovery actions based on a reassessment of organizational needs and resources"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-02.349."}, {"role": "assistant", "content": "Change planned recovery actions based on a reassessment of organizational needs and resources"}]} {"messages": [{"role": "user", "content": "What is RC.RP-03.350? (Ex1)"}, {"role": "assistant", "content": "Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-03.350."}, {"role": "assistant", "content": "Check restoration assets for indicators of compromise, file corruption, and other integrity issues before use"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.351? (Ex1)"}, {"role": "assistant", "content": "Use business impact and system categorization records (including service delivery objectives) to validate that essential services are restored in the appropriate order"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.351."}, {"role": "assistant", "content": "Use business impact and system categorization records (including service delivery objectives) to validate that essential services are restored in the appropriate order"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.352? (Ex2)"}, {"role": "assistant", "content": "Work with system owners to confirm the successful restoration of systems and the return to normal operations"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.352."}, {"role": "assistant", "content": "Work with system owners to confirm the successful restoration of systems and the return to normal operations"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04.353? (Ex3)"}, {"role": "assistant", "content": "Monitor the performance of restored systems to verify the adequacy of the restoration"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-04.353."}, {"role": "assistant", "content": "Monitor the performance of restored systems to verify the adequacy of the restoration"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05.354? (Ex1)"}, {"role": "assistant", "content": "Check restored assets for indicators of compromise and remediation of root causes of the incident before production use"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-05.354."}, {"role": "assistant", "content": "Check restored assets for indicators of compromise and remediation of root causes of the incident before production use"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05.355? (Ex2)"}, {"role": "assistant", "content": "Verify the correctness and adequacy of the restoration actions taken before putting a restored system online"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-05.355."}, {"role": "assistant", "content": "Verify the correctness and adequacy of the restoration actions taken before putting a restored system online"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06.356? (Ex1)"}, {"role": "assistant", "content": "Prepare an after-action report that documents the incident itself, the response and recovery actions taken, and lessons learned"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-06.356."}, {"role": "assistant", "content": "Prepare an after-action report that documents the incident itself, the response and recovery actions taken, and lessons learned"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06.357? (Ex2)"}, {"role": "assistant", "content": "Declare the end of incident recovery once the criteria are met"}]} {"messages": [{"role": "user", "content": "Explain RC.RP-06.357."}, {"role": "assistant", "content": "Declare the end of incident recovery once the criteria are met"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.358? (Ex1)"}, {"role": "assistant", "content": "Securely share recovery information, including restoration progress, consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.358."}, {"role": "assistant", "content": "Securely share recovery information, including restoration progress, consistent with response plans and information sharing agreements"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.359? (Ex2)"}, {"role": "assistant", "content": "Regularly update senior leadership on recovery status and restoration progress for major incidents"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.359."}, {"role": "assistant", "content": "Regularly update senior leadership on recovery status and restoration progress for major incidents"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.360? (Ex3)"}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.360."}, {"role": "assistant", "content": "Follow the rules and protocols defined in contracts for incident information sharing between the organization and its suppliers"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03.361? (Ex4)"}, {"role": "assistant", "content": "Coordinate crisis communication between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-03.361."}, {"role": "assistant", "content": "Coordinate crisis communication between the organization and its critical suppliers"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04.362? (Ex1)"}, {"role": "assistant", "content": "Follow the organization's breach notification procedures for recovering from a data breach incident"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-04.362."}, {"role": "assistant", "content": "Follow the organization's breach notification procedures for recovering from a data breach incident"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04.363? (Ex2)"}, {"role": "assistant", "content": "Explain the steps being taken to recover from the incident and to prevent a recurrence"}]} {"messages": [{"role": "user", "content": "Explain RC.CO-04.363."}, {"role": "assistant", "content": "Explain the steps being taken to recover from the incident and to prevent a recurrence"}]} {"messages": [{"role": "user", "content": "What is GV.OC-01?"}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-01."}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-01?"}, {"role": "assistant", "content": "The organizational mission is understood and informs cybersecurity risk management"}]} {"messages": [{"role": "user", "content": "What is GV.OC-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-02."}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered"}]} {"messages": [{"role": "user", "content": "What is GV.OC-03?"}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-03."}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-03?"}, {"role": "assistant", "content": "Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed"}]} {"messages": [{"role": "user", "content": "What is GV.OC-04?"}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-04."}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-04?"}, {"role": "assistant", "content": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.OC-05?"}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OC-05."}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OC-05?"}, {"role": "assistant", "content": "Outcomes, capabilities, and services that the organization depends on are understood and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.RM-01?"}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-01."}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-01?"}, {"role": "assistant", "content": "Risk management objectives are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.RM-02?"}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-02."}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-02?"}, {"role": "assistant", "content": "Risk appetite and risk tolerance statements are established, communicated, and maintained"}]} {"messages": [{"role": "user", "content": "What is GV.RM-03?"}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-03."}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-03?"}, {"role": "assistant", "content": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes"}]} {"messages": [{"role": "user", "content": "What is GV.RM-04?"}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-04."}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-04?"}, {"role": "assistant", "content": "Strategic direction that describes appropriate risk response options is established and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.RM-05?"}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-05."}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-05?"}, {"role": "assistant", "content": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties"}]} {"messages": [{"role": "user", "content": "What is GV.RM-06?"}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-06."}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-06?"}, {"role": "assistant", "content": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated"}]} {"messages": [{"role": "user", "content": "What is GV.RM-07?"}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RM-07."}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RM-07?"}, {"role": "assistant", "content": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions"}]} {"messages": [{"role": "user", "content": "What is GV.RR-01?"}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-01."}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-01?"}, {"role": "assistant", "content": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving"}]} {"messages": [{"role": "user", "content": "What is GV.RR-02?"}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-02."}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-02?"}, {"role": "assistant", "content": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced"}]} {"messages": [{"role": "user", "content": "What is GV.RR-03?"}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-03."}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-03?"}, {"role": "assistant", "content": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies"}]} {"messages": [{"role": "user", "content": "What is GV.RR-04?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.RR-04."}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.RR-04?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices"}]} {"messages": [{"role": "user", "content": "What is GV.PO-01?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.PO-01."}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.PO-01?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced"}]} {"messages": [{"role": "user", "content": "What is GV.PO-02?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.PO-02."}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.PO-02?"}, {"role": "assistant", "content": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission"}]} {"messages": [{"role": "user", "content": "What is GV.OV-01?"}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-01."}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-01?"}, {"role": "assistant", "content": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction"}]} {"messages": [{"role": "user", "content": "What is GV.OV-02?"}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-02."}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-02?"}, {"role": "assistant", "content": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks"}]} {"messages": [{"role": "user", "content": "What is GV.OV-03?"}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.OV-03."}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.OV-03?"}, {"role": "assistant", "content": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed"}]} {"messages": [{"role": "user", "content": "What is GV.SC-01?"}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-01."}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-01?"}, {"role": "assistant", "content": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is GV.SC-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-02."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally"}]} {"messages": [{"role": "user", "content": "What is GV.SC-03?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-03."}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-03?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes"}]} {"messages": [{"role": "user", "content": "What is GV.SC-04?"}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-04."}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-04?"}, {"role": "assistant", "content": "Suppliers are known and prioritized by criticality"}]} {"messages": [{"role": "user", "content": "What is GV.SC-05?"}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-05."}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-05?"}, {"role": "assistant", "content": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties"}]} {"messages": [{"role": "user", "content": "What is GV.SC-06?"}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-06."}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-06?"}, {"role": "assistant", "content": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships"}]} {"messages": [{"role": "user", "content": "What is GV.SC-07?"}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-07."}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-07?"}, {"role": "assistant", "content": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship"}]} {"messages": [{"role": "user", "content": "What is GV.SC-08?"}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-08."}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-08?"}, {"role": "assistant", "content": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities"}]} {"messages": [{"role": "user", "content": "What is GV.SC-09?"}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-09."}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-09?"}, {"role": "assistant", "content": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle"}]} {"messages": [{"role": "user", "content": "What is GV.SC-10?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "Explain the requirement of GV.SC-10."}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "What outcome is expected by GV.SC-10?"}, {"role": "assistant", "content": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement"}]} {"messages": [{"role": "user", "content": "What is ID.AM-01?"}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-01."}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-01?"}, {"role": "assistant", "content": "Inventories of hardware managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-02?"}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-02."}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-02?"}, {"role": "assistant", "content": "Inventories of software, services, and systems managed by the organization are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-03?"}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-03."}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-03?"}, {"role": "assistant", "content": "Representations of the organization's authorized network communication and internal and external network data flows are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-04?"}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-04."}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-04?"}, {"role": "assistant", "content": "Inventories of services provided by suppliers are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-05?"}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-05."}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-05?"}, {"role": "assistant", "content": "Assets are prioritized based on classification, criticality, resources, and impact on the mission"}]} {"messages": [{"role": "user", "content": "What is ID.AM-07?"}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-07."}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-07?"}, {"role": "assistant", "content": "Inventories of data and corresponding metadata for designated data types are maintained"}]} {"messages": [{"role": "user", "content": "What is ID.AM-08?"}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-08."}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-08?"}, {"role": "assistant", "content": "Systems, hardware, software, services, and data are managed throughout their life cycles"}]} {"messages": [{"role": "user", "content": "What is ID.RA-01?"}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-01."}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-01?"}, {"role": "assistant", "content": "Vulnerabilities in assets are identified, validated, and recorded"}]} {"messages": [{"role": "user", "content": "What is ID.RA-02?"}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-02."}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-02?"}, {"role": "assistant", "content": "Cyber threat intelligence is received from information sharing forums and sources"}]} {"messages": [{"role": "user", "content": "What is ID.RA-03?"}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-03."}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-03?"}, {"role": "assistant", "content": "Internal and external threats to the organization are identified and recorded"}]} {"messages": [{"role": "user", "content": "What is ID.RA-04?"}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-04."}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-04?"}, {"role": "assistant", "content": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded"}]} {"messages": [{"role": "user", "content": "What is ID.RA-05?"}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-05."}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-05?"}, {"role": "assistant", "content": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization"}]} {"messages": [{"role": "user", "content": "What is ID.RA-06?"}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-06."}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-06?"}, {"role": "assistant", "content": "Risk responses are chosen, prioritized, planned, tracked, and communicated"}]} {"messages": [{"role": "user", "content": "What is ID.RA-07?"}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-07."}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-07?"}, {"role": "assistant", "content": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked"}]} {"messages": [{"role": "user", "content": "What is ID.RA-08?"}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-08."}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-08?"}, {"role": "assistant", "content": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established"}]} {"messages": [{"role": "user", "content": "What is ID.RA-09?"}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-09."}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-09?"}, {"role": "assistant", "content": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use"}]} {"messages": [{"role": "user", "content": "What is ID.RA-10?"}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RA-10."}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RA-10?"}, {"role": "assistant", "content": "Critical suppliers are assessed prior to acquisition"}]} {"messages": [{"role": "user", "content": "What is ID.IM-01?"}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-01."}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-01?"}, {"role": "assistant", "content": "Improvements are identified from evaluations"}]} {"messages": [{"role": "user", "content": "What is ID.IM-02?"}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-02."}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-02?"}, {"role": "assistant", "content": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties"}]} {"messages": [{"role": "user", "content": "What is ID.IM-03?"}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-03."}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-03?"}, {"role": "assistant", "content": "Improvements are identified from execution of operational processes, procedures, and activities"}]} {"messages": [{"role": "user", "content": "What is ID.IM-04?"}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.IM-04."}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.IM-04?"}, {"role": "assistant", "content": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved"}]} {"messages": [{"role": "user", "content": "What is PR.AA-01?"}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-01."}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-01?"}, {"role": "assistant", "content": "Identities and credentials for authorized users, services, and hardware are managed by the organization"}]} {"messages": [{"role": "user", "content": "What is PR.AA-02?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-02."}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-02?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials based on the context of interactions"}]} {"messages": [{"role": "user", "content": "What is PR.AA-03?"}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-03."}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-03?"}, {"role": "assistant", "content": "Users, services, and hardware are authenticated"}]} {"messages": [{"role": "user", "content": "What is PR.AA-04?"}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-04."}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-04?"}, {"role": "assistant", "content": "Identity assertions are protected, conveyed, and verified"}]} {"messages": [{"role": "user", "content": "What is PR.AA-05?"}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-05."}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-05?"}, {"role": "assistant", "content": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What is PR.AA-06?"}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AA-06."}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AA-06?"}, {"role": "assistant", "content": "Physical access to assets is managed, monitored, and enforced commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is PR.AT-01?"}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-01."}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-01?"}, {"role": "assistant", "content": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What is PR.AT-02?"}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-02."}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-02?"}, {"role": "assistant", "content": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind"}]} {"messages": [{"role": "user", "content": "What is PR.DS-01?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-01."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-01?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-at-rest are protected"}]} {"messages": [{"role": "user", "content": "What is PR.DS-02?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-02."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-02?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-transit are protected"}]} {"messages": [{"role": "user", "content": "What is PR.DS-10?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-10."}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-10?"}, {"role": "assistant", "content": "The confidentiality, integrity, and availability of data-in-use are protected"}]} {"messages": [{"role": "user", "content": "What is PR.DS-11?"}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-11."}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-11?"}, {"role": "assistant", "content": "Backups of data are created, protected, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What is PR.PS-01?"}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-01."}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-01?"}, {"role": "assistant", "content": "Configuration management practices are established and applied"}]} {"messages": [{"role": "user", "content": "What is PR.PS-02?"}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-02."}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-02?"}, {"role": "assistant", "content": "Software is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-03?"}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-03."}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-03?"}, {"role": "assistant", "content": "Hardware is maintained, replaced, and removed commensurate with risk"}]} {"messages": [{"role": "user", "content": "What is PR.PS-04?"}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-04."}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-04?"}, {"role": "assistant", "content": "Log records are generated and made available for continuous monitoring"}]} {"messages": [{"role": "user", "content": "What is PR.PS-05?"}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-05."}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-05?"}, {"role": "assistant", "content": "Installation and execution of unauthorized software are prevented"}]} {"messages": [{"role": "user", "content": "What is PR.PS-06?"}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PS-06."}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PS-06?"}, {"role": "assistant", "content": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle"}]} {"messages": [{"role": "user", "content": "What is PR.IR-01?"}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-01."}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-01?"}, {"role": "assistant", "content": "Networks and environments are protected from unauthorized logical access and usage"}]} {"messages": [{"role": "user", "content": "What is PR.IR-02?"}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-02."}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-02?"}, {"role": "assistant", "content": "The organization's technology assets are protected from environmental threats"}]} {"messages": [{"role": "user", "content": "What is PR.IR-03?"}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-03."}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-03?"}, {"role": "assistant", "content": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What is PR.IR-04?"}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IR-04."}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IR-04?"}, {"role": "assistant", "content": "Adequate resource capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What is DE.CM-01?"}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-01."}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-01?"}, {"role": "assistant", "content": "Networks and network services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-02?"}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-02."}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-02?"}, {"role": "assistant", "content": "The physical environment is monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-03?"}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-03."}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-03?"}, {"role": "assistant", "content": "Personnel activity and technology usage are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-06?"}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-06."}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-06?"}, {"role": "assistant", "content": "External service provider activities and services are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.CM-09?"}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-09."}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-09?"}, {"role": "assistant", "content": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events"}]} {"messages": [{"role": "user", "content": "What is DE.AE-02?"}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-02."}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-02?"}, {"role": "assistant", "content": "Potentially adverse events are analyzed to better understand associated activities"}]} {"messages": [{"role": "user", "content": "What is DE.AE-03?"}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-03."}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-03?"}, {"role": "assistant", "content": "Information is correlated from multiple sources"}]} {"messages": [{"role": "user", "content": "What is DE.AE-04?"}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-04."}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-04?"}, {"role": "assistant", "content": "The estimated impact and scope of adverse events are understood"}]} {"messages": [{"role": "user", "content": "What is DE.AE-06?"}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-06."}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-06?"}, {"role": "assistant", "content": "Information on adverse events is provided to authorized staff and tools"}]} {"messages": [{"role": "user", "content": "What is DE.AE-07?"}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-07."}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-07?"}, {"role": "assistant", "content": "Cyber threat intelligence and other contextual information are integrated into the analysis"}]} {"messages": [{"role": "user", "content": "What is DE.AE-08?"}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-08."}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-08?"}, {"role": "assistant", "content": "Incidents are declared when adverse events meet the defined incident criteria"}]} {"messages": [{"role": "user", "content": "What is RS.MA-01?"}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-01."}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-01?"}, {"role": "assistant", "content": "The incident response plan is executed in coordination with relevant third parties once an incident is declared"}]} {"messages": [{"role": "user", "content": "What is RS.MA-02?"}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-02."}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-02?"}, {"role": "assistant", "content": "Incident reports are triaged and validated"}]} {"messages": [{"role": "user", "content": "What is RS.MA-03?"}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-03."}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-03?"}, {"role": "assistant", "content": "Incidents are categorized and prioritized"}]} {"messages": [{"role": "user", "content": "What is RS.MA-04?"}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-04."}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-04?"}, {"role": "assistant", "content": "Incidents are escalated or elevated as needed"}]} {"messages": [{"role": "user", "content": "What is RS.MA-05?"}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MA-05."}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MA-05?"}, {"role": "assistant", "content": "The criteria for initiating incident recovery are applied"}]} {"messages": [{"role": "user", "content": "What is RS.AN-03?"}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-03."}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-03?"}, {"role": "assistant", "content": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident"}]} {"messages": [{"role": "user", "content": "What is RS.AN-06?"}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-06."}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-06?"}, {"role": "assistant", "content": "Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What is RS.AN-07?"}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-07."}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-07?"}, {"role": "assistant", "content": "Incident data and metadata are collected, and their integrity and provenance are preserved"}]} {"messages": [{"role": "user", "content": "What is RS.AN-08?"}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-08."}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-08?"}, {"role": "assistant", "content": "An incident's magnitude is estimated and validated"}]} {"messages": [{"role": "user", "content": "What is RS.CO-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-02."}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-02?"}, {"role": "assistant", "content": "Internal and external stakeholders are notified of incidents"}]} {"messages": [{"role": "user", "content": "What is RS.CO-03?"}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-03."}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-03?"}, {"role": "assistant", "content": "Information is shared with designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is RS.MI-01?"}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-01."}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-01?"}, {"role": "assistant", "content": "Incidents are contained"}]} {"messages": [{"role": "user", "content": "What is RS.MI-02?"}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-02."}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-02?"}, {"role": "assistant", "content": "Incidents are eradicated"}]} {"messages": [{"role": "user", "content": "What is RC.RP-01?"}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-01."}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-01?"}, {"role": "assistant", "content": "The recovery portion of the incident response plan is executed once initiated from the incident response process"}]} {"messages": [{"role": "user", "content": "What is RC.RP-02?"}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-02."}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-02?"}, {"role": "assistant", "content": "Recovery actions are selected, scoped, prioritized, and performed"}]} {"messages": [{"role": "user", "content": "What is RC.RP-03?"}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-03."}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-03?"}, {"role": "assistant", "content": "The integrity of backups and other restoration assets is verified before using them for restoration"}]} {"messages": [{"role": "user", "content": "What is RC.RP-04?"}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-04."}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-04?"}, {"role": "assistant", "content": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms"}]} {"messages": [{"role": "user", "content": "What is RC.RP-05?"}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-05."}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-05?"}, {"role": "assistant", "content": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed"}]} {"messages": [{"role": "user", "content": "What is RC.RP-06?"}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.RP-06."}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.RP-06?"}, {"role": "assistant", "content": "The end of incident recovery is declared based on criteria, and incident-related documentation is completed"}]} {"messages": [{"role": "user", "content": "What is RC.CO-03?"}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-03."}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-03?"}, {"role": "assistant", "content": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders"}]} {"messages": [{"role": "user", "content": "What is RC.CO-04?"}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-04."}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-04?"}, {"role": "assistant", "content": "Public updates on incident recovery are shared using approved methods and messaging"}]} {"messages": [{"role": "user", "content": "What is third? (3rd)"}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "Explain third."}, {"role": "assistant", "content": "3rd Party Risk"}]} {"messages": [{"role": "user", "content": "What is first? (1st)"}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "Explain first."}, {"role": "assistant", "content": "1st Party Risk"}]} {"messages": [{"role": "user", "content": "What is ID.AM-06?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.AM-06."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.AM-06?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established"}]} {"messages": [{"role": "user", "content": "What is WR-ID.AM-06?"}, {"role": "assistant", "content": "Incorporated into GV.RR-02, GV.SC-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.AM-06."}, {"role": "assistant", "content": "Incorporated into GV.RR-02, GV.SC-02"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE?"}, {"role": "assistant", "content": "Incorporated into GV.OC"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE."}, {"role": "assistant", "content": "Incorporated into GV.OC"}]} {"messages": [{"role": "user", "content": "What is ID.BE-01?"}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-01."}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-01?"}, {"role": "assistant", "content": "The organization’s role in the supply chain is identified and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-01?"}, {"role": "assistant", "content": "Incorporated into GV.OC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-01."}, {"role": "assistant", "content": "Incorporated into GV.OC-05"}]} {"messages": [{"role": "user", "content": "What is ID.BE-02?"}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-02."}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-02?"}, {"role": "assistant", "content": "The organization’s place in critical infrastructure and its industry sector is identified and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "What is ID.BE-03?"}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-03."}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-03?"}, {"role": "assistant", "content": "Priorities for organizational mission, objectives, and activities are established and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-03?"}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-03."}, {"role": "assistant", "content": "Incorporated into GV.OC-01"}]} {"messages": [{"role": "user", "content": "What is ID.BE-04?"}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-04."}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-04?"}, {"role": "assistant", "content": "Dependencies and critical functions for delivery of critical services are established"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-04?"}, {"role": "assistant", "content": "Incorporated into GV.OC-04, GV.OC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-04."}, {"role": "assistant", "content": "Incorporated into GV.OC-04, GV.OC-05"}]} {"messages": [{"role": "user", "content": "What is ID.BE-05?"}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.BE-05."}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.BE-05?"}, {"role": "assistant", "content": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)"}]} {"messages": [{"role": "user", "content": "What is WR-ID.BE-05?"}, {"role": "assistant", "content": "Incorporated into GV.OC-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.BE-05."}, {"role": "assistant", "content": "Incorporated into GV.OC-04"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV?"}, {"role": "assistant", "content": "Incorporated into GV"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV."}, {"role": "assistant", "content": "Incorporated into GV"}]} {"messages": [{"role": "user", "content": "What is ID.GV-01?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-01."}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-01?"}, {"role": "assistant", "content": "Organizational cybersecurity policy is established and communicated"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-01?"}, {"role": "assistant", "content": "Incorporated into GV.PO, GV.PO-01, GV.PO-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-01."}, {"role": "assistant", "content": "Incorporated into GV.PO, GV.PO-01, GV.PO-02"}]} {"messages": [{"role": "user", "content": "What is ID.GV-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-02."}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-02?"}, {"role": "assistant", "content": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.RR, GV.RR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.RR, GV.RR-02"}]} {"messages": [{"role": "user", "content": "What is ID.GV-03?"}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-03."}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-03?"}, {"role": "assistant", "content": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-03?"}, {"role": "assistant", "content": "Moved to GV.OC-03"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-03."}, {"role": "assistant", "content": "Moved to GV.OC-03"}]} {"messages": [{"role": "user", "content": "What is ID.GV-04?"}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.GV-04."}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.GV-04?"}, {"role": "assistant", "content": "Governance and risk management processes address cybersecurity risks"}]} {"messages": [{"role": "user", "content": "What is WR-ID.GV-04?"}, {"role": "assistant", "content": "Moved to GV.RM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.GV-04."}, {"role": "assistant", "content": "Moved to GV.RM-04"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM?"}, {"role": "assistant", "content": "Incorporated into GV.RM"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM."}, {"role": "assistant", "content": "Incorporated into GV.RM"}]} {"messages": [{"role": "user", "content": "What is ID.RM-01?"}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-01."}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-01?"}, {"role": "assistant", "content": "Risk management processes are established, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-01?"}, {"role": "assistant", "content": "Incorporated into GV.RM-01, GV.RM-06, GV.RR-03"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-01."}, {"role": "assistant", "content": "Incorporated into GV.RM-01, GV.RM-06, GV.RR-03"}]} {"messages": [{"role": "user", "content": "What is ID.RM-02?"}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-02."}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-02?"}, {"role": "assistant", "content": "Organizational risk tolerance is determined and clearly expressed"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-02?"}, {"role": "assistant", "content": "Incorporated into GV.RM-02, GV.RM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-02."}, {"role": "assistant", "content": "Incorporated into GV.RM-02, GV.RM-04"}]} {"messages": [{"role": "user", "content": "What is ID.RM-03?"}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.RM-03."}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.RM-03?"}, {"role": "assistant", "content": "The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis"}]} {"messages": [{"role": "user", "content": "What is WR-ID.RM-03?"}, {"role": "assistant", "content": "Moved into GV.RM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.RM-03."}, {"role": "assistant", "content": "Moved into GV.RM-02"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC?"}, {"role": "assistant", "content": "Incorporated into GV.SC"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC."}, {"role": "assistant", "content": "Incorporated into GV.SC"}]} {"messages": [{"role": "user", "content": "What is ID.SC-01?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-01."}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-01?"}, {"role": "assistant", "content": "Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-01?"}, {"role": "assistant", "content": "Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-01."}, {"role": "assistant", "content": "Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-02?"}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-02."}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-02?"}, {"role": "assistant", "content": "Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-02?"}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-02."}, {"role": "assistant", "content": "Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-03?"}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-03."}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-03?"}, {"role": "assistant", "content": "Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan."}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-03?"}, {"role": "assistant", "content": "Moved to GV.SC-05"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-03."}, {"role": "assistant", "content": "Moved to GV.SC-05"}]} {"messages": [{"role": "user", "content": "What is ID.SC-04?"}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-04."}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-04?"}, {"role": "assistant", "content": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations."}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-04?"}, {"role": "assistant", "content": "Incorporated into GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-04."}, {"role": "assistant", "content": "Incorporated into GV.SC-07, ID.RA-10"}]} {"messages": [{"role": "user", "content": "What is ID.SC-05?"}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "Explain the requirement of ID.SC-05."}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "What outcome is expected by ID.SC-05?"}, {"role": "assistant", "content": "Response and recovery planning and testing are conducted with suppliers and third-party providers"}]} {"messages": [{"role": "user", "content": "What is WR-ID.SC-05?"}, {"role": "assistant", "content": "Incorporated into GV.SC-08, ID.IM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-ID.SC-05."}, {"role": "assistant", "content": "Incorporated into GV.SC-08, ID.IM-02"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC?"}, {"role": "assistant", "content": "Moved to PR.AA"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC."}, {"role": "assistant", "content": "Moved to PR.AA"}]} {"messages": [{"role": "user", "content": "What is PR.AC-01?"}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-01."}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-01?"}, {"role": "assistant", "content": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-01?"}, {"role": "assistant", "content": "Incorporated into PR.AA-01, PR.AA-05"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-01."}, {"role": "assistant", "content": "Incorporated into PR.AA-01, PR.AA-05"}]} {"messages": [{"role": "user", "content": "What is PR.AC-02?"}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-02."}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-02?"}, {"role": "assistant", "content": "Physical access to assets is managed and protected"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-02?"}, {"role": "assistant", "content": "Moved to PR.AA-06"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-02."}, {"role": "assistant", "content": "Moved to PR.AA-06"}]} {"messages": [{"role": "user", "content": "What is PR.AC-03?"}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-03."}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-03?"}, {"role": "assistant", "content": "Remote access is managed"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-03?"}, {"role": "assistant", "content": "Incorporated into PR.AA-03, PR.AA-05, PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-03."}, {"role": "assistant", "content": "Incorporated into PR.AA-03, PR.AA-05, PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.AC-04?"}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-04."}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-04?"}, {"role": "assistant", "content": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-04?"}, {"role": "assistant", "content": "Moved to PR.AA-05"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-04."}, {"role": "assistant", "content": "Moved to PR.AA-05"}]} {"messages": [{"role": "user", "content": "What is PR.AC-05?"}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-05."}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-05?"}, {"role": "assistant", "content": "Network integrity is protected (e.g., network segregation, network segmentation)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-05?"}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-05."}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.AC-06?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-06."}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-06?"}, {"role": "assistant", "content": "Identities are proofed and bound to credentials and asserted in interactions"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-06?"}, {"role": "assistant", "content": "Moved to PR.AA-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-06."}, {"role": "assistant", "content": "Moved to PR.AA-02"}]} {"messages": [{"role": "user", "content": "What is PR.AC-07?"}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AC-07."}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AC-07?"}, {"role": "assistant", "content": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AC-07?"}, {"role": "assistant", "content": "Moved to PR.AA-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AC-07."}, {"role": "assistant", "content": "Moved to PR.AA-03"}]} {"messages": [{"role": "user", "content": "What is PR.AT-03?"}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-03."}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-03?"}, {"role": "assistant", "content": "Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-03?"}, {"role": "assistant", "content": "Incorporated into PR.AT-01, PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-03."}, {"role": "assistant", "content": "Incorporated into PR.AT-01, PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.AT-04?"}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-04."}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-04?"}, {"role": "assistant", "content": "Senior executives understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-04?"}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-04."}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.AT-05?"}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.AT-05."}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.AT-05?"}, {"role": "assistant", "content": "Physical and cybersecurity personnel understand their roles and responsibilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.AT-05?"}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.AT-05."}, {"role": "assistant", "content": "Incorporated into PR.AT-02"}]} {"messages": [{"role": "user", "content": "What is PR.DS-03?"}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-03."}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-03?"}, {"role": "assistant", "content": "Assets are formally managed throughout removal, transfers, and disposition"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-03?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-03."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "What is PR.DS-04?"}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-04."}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-04?"}, {"role": "assistant", "content": "Adequate capacity to ensure availability is maintained"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-04?"}, {"role": "assistant", "content": "Moved to PR.IR-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-04."}, {"role": "assistant", "content": "Moved to PR.IR-04"}]} {"messages": [{"role": "user", "content": "What is PR.DS-05?"}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-05."}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-05?"}, {"role": "assistant", "content": "Protections against data leaks are implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-05?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.DS-02, PR.DS-10"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-05."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.DS-02, PR.DS-10"}]} {"messages": [{"role": "user", "content": "What is PR.DS-06?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-06."}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-06?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify software, firmware, and information integrity"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-06?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-06."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is PR.DS-07?"}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-07."}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-07?"}, {"role": "assistant", "content": "The development and testing environment(s) are separate from the production environment"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-07?"}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-07."}, {"role": "assistant", "content": "Incorporated into PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.DS-08?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.DS-08."}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.DS-08?"}, {"role": "assistant", "content": "Integrity checking mechanisms are used to verify hardware integrity"}]} {"messages": [{"role": "user", "content": "What is WR-PR.DS-08?"}, {"role": "assistant", "content": "Incorporated into ID.RA-09, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.DS-08."}, {"role": "assistant", "content": "Incorporated into ID.RA-09, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP?"}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP."}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "What is PR.IP-01?"}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-01."}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-01?"}, {"role": "assistant", "content": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-01?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-01."}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.IP-02?"}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-02."}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-02?"}, {"role": "assistant", "content": "A System Development Life Cycle to manage systems is implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-02?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-06"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-02."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-06"}]} {"messages": [{"role": "user", "content": "What is PR.IP-03?"}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-03."}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-03?"}, {"role": "assistant", "content": "Configuration change control processes are in place"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-03?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01, ID.RA-07"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-03."}, {"role": "assistant", "content": "Incorporated into PR.PS-01, ID.RA-07"}]} {"messages": [{"role": "user", "content": "What is PR.IP-04?"}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-04."}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-04?"}, {"role": "assistant", "content": "Backups of information are conducted, maintained, and tested"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-04?"}, {"role": "assistant", "content": "Moved to PR.DS-11"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-04."}, {"role": "assistant", "content": "Moved to PR.DS-11"}]} {"messages": [{"role": "user", "content": "What is PR.IP-05?"}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-05."}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-05?"}, {"role": "assistant", "content": "Policy and regulations regarding the physical operating environment for organizational assets are met"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-05?"}, {"role": "assistant", "content": "Moved to PR.IR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-05."}, {"role": "assistant", "content": "Moved to PR.IR-02"}]} {"messages": [{"role": "user", "content": "What is PR.IP-06?"}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-06."}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-06?"}, {"role": "assistant", "content": "Data is destroyed according to policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-06?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-06."}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "What is PR.IP-07?"}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-07."}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-07?"}, {"role": "assistant", "content": "Protection processes are improved"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-07?"}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-07."}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is PR.IP-08?"}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-08."}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-08?"}, {"role": "assistant", "content": "Effectiveness of protection technologies is shared"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-08?"}, {"role": "assistant", "content": "Moved to ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-08."}, {"role": "assistant", "content": "Moved to ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is PR.IP-09?"}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-09."}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-09?"}, {"role": "assistant", "content": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-09?"}, {"role": "assistant", "content": "Moved to ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-09."}, {"role": "assistant", "content": "Moved to ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-10?"}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-10."}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-10?"}, {"role": "assistant", "content": "Response and recovery plans are tested"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-10?"}, {"role": "assistant", "content": "Incorporated into ID.IM-02, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-10."}, {"role": "assistant", "content": "Incorporated into ID.IM-02, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-11?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-11."}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-11?"}, {"role": "assistant", "content": "Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-11?"}, {"role": "assistant", "content": "Moved to GV.RR-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-11."}, {"role": "assistant", "content": "Moved to GV.RR-04"}]} {"messages": [{"role": "user", "content": "What is PR.IP-12?"}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.IP-12."}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.IP-12?"}, {"role": "assistant", "content": "A vulnerability management plan is developed and implemented"}]} {"messages": [{"role": "user", "content": "What is WR-PR.IP-12?"}, {"role": "assistant", "content": "Incorporated into ID.RA-01, PR.PS-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.IP-12."}, {"role": "assistant", "content": "Incorporated into ID.RA-01, PR.PS-02"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA."}, {"role": "assistant", "content": "Incorporated into ID.AM-08"}]} {"messages": [{"role": "user", "content": "What is PR.MA-01?"}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.MA-01."}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.MA-01?"}, {"role": "assistant", "content": "Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA-01?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA-01."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-03"}]} {"messages": [{"role": "user", "content": "What is PR.MA-02?"}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.MA-02."}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.MA-02?"}, {"role": "assistant", "content": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access"}]} {"messages": [{"role": "user", "content": "What is WR-PR.MA-02?"}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-02"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.MA-02."}, {"role": "assistant", "content": "Incorporated into ID.AM-08, PR.PS-02"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT?"}, {"role": "assistant", "content": "Incorporated into other Protect Categories"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT."}, {"role": "assistant", "content": "Incorporated into other Protect Categories"}]} {"messages": [{"role": "user", "content": "What is PR.PT-01?"}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-01."}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-01?"}, {"role": "assistant", "content": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-01?"}, {"role": "assistant", "content": "Incorporated into PR.PS-04"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-01."}, {"role": "assistant", "content": "Incorporated into PR.PS-04"}]} {"messages": [{"role": "user", "content": "What is PR.PT-02?"}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-02."}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-02?"}, {"role": "assistant", "content": "Removable media is protected and its use restricted according to policy"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-02?"}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-02."}, {"role": "assistant", "content": "Incorporated into PR.DS-01, PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-03?"}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-03."}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-03?"}, {"role": "assistant", "content": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-03?"}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-03."}, {"role": "assistant", "content": "Incorporated into PR.PS-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-04?"}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-04."}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-04?"}, {"role": "assistant", "content": "Communications and control networks are protected"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-04?"}, {"role": "assistant", "content": "Incorporated into PR.AA-06, PR.IR-01"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-04."}, {"role": "assistant", "content": "Incorporated into PR.AA-06, PR.IR-01"}]} {"messages": [{"role": "user", "content": "What is PR.PT-05?"}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "Explain the requirement of PR.PT-05."}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What outcome is expected by PR.PT-05?"}, {"role": "assistant", "content": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations"}]} {"messages": [{"role": "user", "content": "What is WR-PR.PT-05?"}, {"role": "assistant", "content": "Moved to PR.IR-03"}]} {"messages": [{"role": "user", "content": "Explain WR-PR.PT-05."}, {"role": "assistant", "content": "Moved to PR.IR-03"}]} {"messages": [{"role": "user", "content": "What is DE.CM-04?"}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-04."}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-04?"}, {"role": "assistant", "content": "Malicious code is detected"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-04?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-04."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-05?"}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-05."}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-05?"}, {"role": "assistant", "content": "Unauthorized mobile code is detected"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-05?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-05."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-07?"}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-07."}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-07?"}, {"role": "assistant", "content": "Monitoring for unauthorized personnel, connections, devices, and software is performed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-07?"}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-07."}, {"role": "assistant", "content": "Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09"}]} {"messages": [{"role": "user", "content": "What is DE.CM-08?"}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.CM-08."}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.CM-08?"}, {"role": "assistant", "content": "Vulnerability scans are performed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.CM-08?"}, {"role": "assistant", "content": "Incorporated into ID.RA-01"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.CM-08."}, {"role": "assistant", "content": "Incorporated into ID.RA-01"}]} {"messages": [{"role": "user", "content": "What is DE.AE-01?"}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-01."}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-01?"}, {"role": "assistant", "content": "A baseline of network operations and expected data flows for users and systems is established and managed"}]} {"messages": [{"role": "user", "content": "What is WR-DE.AE-01?"}, {"role": "assistant", "content": "Incorporated into ID.AM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.AE-01."}, {"role": "assistant", "content": "Incorporated into ID.AM-03"}]} {"messages": [{"role": "user", "content": "What is DE.AE-05?"}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.AE-05."}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.AE-05?"}, {"role": "assistant", "content": "Incident alert thresholds are established"}]} {"messages": [{"role": "user", "content": "What is WR-DE.AE-05?"}, {"role": "assistant", "content": "Moved to DE.AE-08"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.AE-05."}, {"role": "assistant", "content": "Moved to DE.AE-08"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP?"}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP."}, {"role": "assistant", "content": "Incorporated into other Categories and Functions"}]} {"messages": [{"role": "user", "content": "What is DE.DP-01?"}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-01."}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-01?"}, {"role": "assistant", "content": "Roles and responsibilities for detection are well defined to ensure accountability"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-01?"}, {"role": "assistant", "content": "Incorporated into GV.RR-02"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-01."}, {"role": "assistant", "content": "Incorporated into GV.RR-02"}]} {"messages": [{"role": "user", "content": "What is DE.DP-02?"}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-02."}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-02?"}, {"role": "assistant", "content": "Detection activities comply with all applicable requirements"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-02?"}, {"role": "assistant", "content": "Incorporated into DE.AE"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-02."}, {"role": "assistant", "content": "Incorporated into DE.AE"}]} {"messages": [{"role": "user", "content": "What is DE.DP-03?"}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-03."}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-03?"}, {"role": "assistant", "content": "Detection processes are tested"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-03?"}, {"role": "assistant", "content": "Incorporated into ID.IM-02"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-03."}, {"role": "assistant", "content": "Incorporated into ID.IM-02"}]} {"messages": [{"role": "user", "content": "What is DE.DP-04?"}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-04."}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-04?"}, {"role": "assistant", "content": "Event detection information is communicated"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-04?"}, {"role": "assistant", "content": "Incorporated into DE.AE-06"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-04."}, {"role": "assistant", "content": "Incorporated into DE.AE-06"}]} {"messages": [{"role": "user", "content": "What is DE.DP-05?"}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "Explain the requirement of DE.DP-05."}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "What outcome is expected by DE.DP-05?"}, {"role": "assistant", "content": "Detection processes are continuously improved"}]} {"messages": [{"role": "user", "content": "What is WR-DE.DP-05?"}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-DE.DP-05."}, {"role": "assistant", "content": "Incorporated into ID.IM, ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is WR-RS.RP?"}, {"role": "assistant", "content": "Incorporated into RS.MA"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.RP."}, {"role": "assistant", "content": "Incorporated into RS.MA"}]} {"messages": [{"role": "user", "content": "What is RS.RP-01?"}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.RP-01."}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.RP-01?"}, {"role": "assistant", "content": "Response plan is executed during or after an incident"}]} {"messages": [{"role": "user", "content": "What is WR-RS.RP-01?"}, {"role": "assistant", "content": "Incorporated into RS.MA-01"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.RP-01."}, {"role": "assistant", "content": "Incorporated into RS.MA-01"}]} {"messages": [{"role": "user", "content": "What is RS.AN-01?"}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-01."}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-01?"}, {"role": "assistant", "content": "Notifications from detection systems are investigated"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-01?"}, {"role": "assistant", "content": "Incorporated into RS.MA-02"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-01."}, {"role": "assistant", "content": "Incorporated into RS.MA-02"}]} {"messages": [{"role": "user", "content": "What is RS.AN-02?"}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-02."}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-02?"}, {"role": "assistant", "content": "The impact of the incident is understood"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-02?"}, {"role": "assistant", "content": "Incorporated into RS.MA-02, RS.MA-03, RS.MA-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-02."}, {"role": "assistant", "content": "Incorporated into RS.MA-02, RS.MA-03, RS.MA-04"}]} {"messages": [{"role": "user", "content": "What is RS.AN-04?"}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-04."}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-04?"}, {"role": "assistant", "content": "Incidents are categorized consistent with response plans"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-04?"}, {"role": "assistant", "content": "Moved to RS.MA-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-04."}, {"role": "assistant", "content": "Moved to RS.MA-03"}]} {"messages": [{"role": "user", "content": "What is RS.AN-05?"}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.AN-05."}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.AN-05?"}, {"role": "assistant", "content": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)"}]} {"messages": [{"role": "user", "content": "What is WR-RS.AN-05?"}, {"role": "assistant", "content": "Moved to ID.RA-08"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.AN-05."}, {"role": "assistant", "content": "Moved to ID.RA-08"}]} {"messages": [{"role": "user", "content": "What is RS.CO-01?"}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-01."}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-01?"}, {"role": "assistant", "content": "Personnel know their roles and order of operations when a response is needed"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-01?"}, {"role": "assistant", "content": "Incorporated into PR.AT-01"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-01."}, {"role": "assistant", "content": "Incorporated into PR.AT-01"}]} {"messages": [{"role": "user", "content": "What is RS.CO-04?"}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-04."}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-04?"}, {"role": "assistant", "content": "Coordination with stakeholders occurs consistent with response plans"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-04?"}, {"role": "assistant", "content": "Incorporated into RS.MA-01, RS.MA-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-04."}, {"role": "assistant", "content": "Incorporated into RS.MA-01, RS.MA-04"}]} {"messages": [{"role": "user", "content": "What is RS.CO-05?"}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.CO-05."}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.CO-05?"}, {"role": "assistant", "content": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness"}]} {"messages": [{"role": "user", "content": "What is WR-RS.CO-05?"}, {"role": "assistant", "content": "Incorporated into RS.CO-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.CO-05."}, {"role": "assistant", "content": "Incorporated into RS.CO-03"}]} {"messages": [{"role": "user", "content": "What is RS.MI-03?"}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.MI-03."}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.MI-03?"}, {"role": "assistant", "content": "Newly identified vulnerabilities are mitigated or documented as accepted risks"}]} {"messages": [{"role": "user", "content": "What is WR-RS.MI-03?"}, {"role": "assistant", "content": "Incorporated into ID.RA-06"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.MI-03."}, {"role": "assistant", "content": "Incorporated into ID.RA-06"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM?"}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM."}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "What is RS.IM-01?"}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.IM-01."}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.IM-01?"}, {"role": "assistant", "content": "Response plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM-01?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM-01."}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is RS.IM-02?"}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RS.IM-02."}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RS.IM-02?"}, {"role": "assistant", "content": "Response strategies are updated"}]} {"messages": [{"role": "user", "content": "What is WR-RS.IM-02?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RS.IM-02."}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "What is RC.CO-01?"}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-01."}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-01?"}, {"role": "assistant", "content": "Public relations are managed"}]} {"messages": [{"role": "user", "content": "What is WR-RC.CO-01?"}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.CO-01."}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "What is RC.CO-02?"}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.CO-02."}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.CO-02?"}, {"role": "assistant", "content": "Reputation is repaired after an incident"}]} {"messages": [{"role": "user", "content": "What is WR-RC.CO-02?"}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.CO-02."}, {"role": "assistant", "content": "Incorporated into RC.CO-04"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM?"}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM."}, {"role": "assistant", "content": "Incorporated into ID.IM"}]} {"messages": [{"role": "user", "content": "What is RC.IM-01?"}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.IM-01."}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.IM-01?"}, {"role": "assistant", "content": "Recovery plans incorporate lessons learned"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM-01?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM-01."}, {"role": "assistant", "content": "Incorporated into ID.IM-03, ID.IM-04"}]} {"messages": [{"role": "user", "content": "What is RC.IM-02?"}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "Explain the requirement of RC.IM-02."}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "What outcome is expected by RC.IM-02?"}, {"role": "assistant", "content": "Recovery strategies are updated"}]} {"messages": [{"role": "user", "content": "What is WR-RC.IM-02?"}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]} {"messages": [{"role": "user", "content": "Explain WR-RC.IM-02."}, {"role": "assistant", "content": "Incorporated into ID.IM-03"}]}