instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is GV? (GOVERN)
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
Summarize the scope of GV.
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
What does GV cover?
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
What is GV.OC? (Organizational Context)
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
Summarize the scope of GV.OC.
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
What does GV.OC cover?
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
What is GV.OC-01?
The organizational mission is understood and informs cybersecurity risk management
Explain the requirement of GV.OC-01.
The organizational mission is understood and informs cybersecurity risk management
What outcome is expected by GV.OC-01?
The organizational mission is understood and informs cybersecurity risk management
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.OC-01.001? (Ex1)
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
Explain GV.OC-01.001.
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
What is GV.OC-02?
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Explain the requirement of GV.OC-02.
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
What outcome is expected by GV.OC-02?
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-02.002? (Ex1)
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
Explain GV.OC-02.002.
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
What is GV.OC-02.003? (Ex2)
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
Explain GV.OC-02.003.
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
What is GV.OC-03?
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
Explain the requirement of GV.OC-03.
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
What outcome is expected by GV.OC-03?
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-03.004? (Ex1)
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
Explain GV.OC-03.004.
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
What is GV.OC-03.005? (Ex2)
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
Explain GV.OC-03.005.
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
What is GV.OC-03.006? (Ex3)
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
Explain GV.OC-03.006.
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
What is GV.OC-04?
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
Explain the requirement of GV.OC-04.
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
What outcome is expected by GV.OC-04?
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.OC-04.007? (Ex1)
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
Explain GV.OC-04.007.
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
What is GV.OC-04.008? (Ex2)
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
Explain GV.OC-04.008.
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
What is GV.OC-04.009? (Ex3)
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
Explain GV.OC-04.009.
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
What is GV.OC-05?
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Explain the requirement of GV.OC-05.
Outcomes, capabilities, and services that the organization depends on are understood and communicated
What outcome is expected by GV.OC-05?
Outcomes, capabilities, and services that the organization depends on are understood and communicated
What is GV.OC-05.010? (Ex1)
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
Explain GV.OC-05.010.
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
What is GV.OC-05.011? (Ex2)
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
Explain GV.OC-05.011.
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RM? (Risk Management Strategy)
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
Summarize the scope of GV.RM.
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
What does GV.RM cover?
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
What is GV.RM-01?
Risk management objectives are established and agreed to by organizational stakeholders
Explain the requirement of GV.RM-01.
Risk management objectives are established and agreed to by organizational stakeholders
What outcome is expected by GV.RM-01?
Risk management objectives are established and agreed to by organizational stakeholders
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-01.012? (Ex1)
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
Explain GV.RM-01.012.
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
What is GV.RM-01.013? (Ex2)
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
Explain GV.RM-01.013.
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
What is GV.RM-01.014? (Ex3)
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
Explain GV.RM-01.014.
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
What is GV.RM-02?
Risk appetite and risk tolerance statements are established, communicated, and maintained
Explain the requirement of GV.RM-02.
Risk appetite and risk tolerance statements are established, communicated, and maintained
What outcome is expected by GV.RM-02?
Risk appetite and risk tolerance statements are established, communicated, and maintained
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RM-02.015? (Ex1)
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
Explain GV.RM-02.015.
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
What is GV.RM-02.016? (Ex2)
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
Explain GV.RM-02.016.
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
What is GV.RM-02.017? (Ex3)
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
Explain GV.RM-02.017.
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
What is GV.RM-03?
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Explain the requirement of GV.RM-03.
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
What outcome is expected by GV.RM-03?
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-03.018? (Ex1)
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
Explain GV.RM-03.018.
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
What is GV.RM-03.019? (Ex2)
Include cybersecurity risk managers in enterprise risk management planning
Explain GV.RM-03.019.
Include cybersecurity risk managers in enterprise risk management planning
What is GV.RM-03.020? (Ex3)
Establish criteria for escalating cybersecurity risks within enterprise risk management
Explain GV.RM-03.020.
Establish criteria for escalating cybersecurity risks within enterprise risk management
What is GV.RM-04?
Strategic direction that describes appropriate risk response options is established and communicated
Explain the requirement of GV.RM-04.
Strategic direction that describes appropriate risk response options is established and communicated
What outcome is expected by GV.RM-04?
Strategic direction that describes appropriate risk response options is established and communicated