instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
---|---|---|
What is GV? (GOVERN)
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
Summarize the scope of GV.
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
What does GV cover?
|
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
|
|
What is GV.OC? (Organizational Context)
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
Summarize the scope of GV.OC.
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
What does GV.OC cover?
|
The circumstances - mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements - surrounding the organization's cybersecurity risk management decisions are understood
|
|
What is GV.OC-01?
|
The organizational mission is understood and informs cybersecurity risk management
|
|
Explain the requirement of GV.OC-01.
|
The organizational mission is understood and informs cybersecurity risk management
|
|
What outcome is expected by GV.OC-01?
|
The organizational mission is understood and informs cybersecurity risk management
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.OC-01.001? (Ex1)
|
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
|
|
Explain GV.OC-01.001.
|
Share the organization's mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission
|
|
What is GV.OC-02?
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
Explain the requirement of GV.OC-02.
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
What outcome is expected by GV.OC-02?
|
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-02.002? (Ex1)
|
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
|
|
Explain GV.OC-02.002.
|
Identify relevant internal stakeholders and their cybersecurity-related expectations (e.g., performance and risk expectations of officers, directors, and advisors; cultural expectations of employees)
|
|
What is GV.OC-02.003? (Ex2)
|
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
|
|
Explain GV.OC-02.003.
|
Identify relevant external stakeholders and their cybersecurity-related expectations (e.g., privacy expectations of customers, business expectations of partnerships, compliance expectations of regulators, ethics expectations of society)
|
|
What is GV.OC-03?
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
Explain the requirement of GV.OC-03.
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
What outcome is expected by GV.OC-03?
|
Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-03.004? (Ex1)
|
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
|
|
Explain GV.OC-03.004.
|
Determine a process to track and manage legal and regulatory requirements regarding protection of individuals' information (e.g., Health Insurance Portability and Accountability Act, California Consumer Privacy Act, General Data Protection Regulation)
|
|
What is GV.OC-03.005? (Ex2)
|
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
|
|
Explain GV.OC-03.005.
|
Determine a process to track and manage contractual requirements for cybersecurity management of supplier, customer, and partner information
|
|
What is GV.OC-03.006? (Ex3)
|
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
|
|
Explain GV.OC-03.006.
|
Align the organization's cybersecurity strategy with legal, regulatory, and contractual requirements
|
|
What is GV.OC-04?
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
Explain the requirement of GV.OC-04.
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
What outcome is expected by GV.OC-04?
|
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.OC-04.007? (Ex1)
|
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
|
|
Explain GV.OC-04.007.
|
Establish criteria for determining the criticality of capabilities and services as viewed by internal and external stakeholders
|
|
What is GV.OC-04.008? (Ex2)
|
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
|
|
Explain GV.OC-04.008.
|
Determine (e.g., from a business impact analysis) assets and business operations that are vital to achieving mission objectives and the potential impact of a loss (or partial loss) of such operations
|
|
What is GV.OC-04.009? (Ex3)
|
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
|
|
Explain GV.OC-04.009.
|
Establish and communicate resilience objectives (e.g., recovery time objectives) for delivering critical capabilities and services in various operating states (e.g., under attack, during recovery, normal operation)
|
|
What is GV.OC-05?
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
Explain the requirement of GV.OC-05.
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
What outcome is expected by GV.OC-05?
|
Outcomes, capabilities, and services that the organization depends on are understood and communicated
|
|
What is GV.OC-05.010? (Ex1)
|
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
|
|
Explain GV.OC-05.010.
|
Create an inventory of the organization's dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions
|
|
What is GV.OC-05.011? (Ex2)
|
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
|
|
Explain GV.OC-05.011.
|
Identify and document external dependencies that are potential points of failure for the organization's critical capabilities and services, and share that information with appropriate personnel
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RM? (Risk Management Strategy)
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
Summarize the scope of GV.RM.
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
What does GV.RM cover?
|
The organization's priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
|
|
What is GV.RM-01?
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
Explain the requirement of GV.RM-01.
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
What outcome is expected by GV.RM-01?
|
Risk management objectives are established and agreed to by organizational stakeholders
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-01.012? (Ex1)
|
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
|
|
Explain GV.RM-01.012.
|
Update near-term and long-term cybersecurity risk management objectives as part of annual strategic planning and when major changes occur
|
|
What is GV.RM-01.013? (Ex2)
|
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
|
|
Explain GV.RM-01.013.
|
Establish measurable objectives for cybersecurity risk management (e.g., manage the quality of user training, ensure adequate risk protection for industrial control systems)
|
|
What is GV.RM-01.014? (Ex3)
|
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
|
|
Explain GV.RM-01.014.
|
Senior leaders agree about cybersecurity objectives and use them for measuring and managing risk and performance
|
|
What is GV.RM-02?
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
Explain the requirement of GV.RM-02.
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
What outcome is expected by GV.RM-02?
|
Risk appetite and risk tolerance statements are established, communicated, and maintained
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RM-02.015? (Ex1)
|
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
|
|
Explain GV.RM-02.015.
|
Determine and communicate risk appetite statements that convey expectations about the appropriate level of risk for the organization
|
|
What is GV.RM-02.016? (Ex2)
|
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
|
|
Explain GV.RM-02.016.
|
Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements
|
|
What is GV.RM-02.017? (Ex3)
|
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
|
|
Explain GV.RM-02.017.
|
Refine organizational objectives and risk appetite periodically based on known risk exposure and residual risk
|
|
What is GV.RM-03?
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
Explain the requirement of GV.RM-03.
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
What outcome is expected by GV.RM-03?
|
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-03.018? (Ex1)
|
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
|
|
Explain GV.RM-03.018.
|
Aggregate and manage cybersecurity risks alongside other enterprise risks (e.g., compliance, financial, operational, regulatory, reputational, safety)
|
|
What is GV.RM-03.019? (Ex2)
|
Include cybersecurity risk managers in enterprise risk management planning
|
|
Explain GV.RM-03.019.
|
Include cybersecurity risk managers in enterprise risk management planning
|
|
What is GV.RM-03.020? (Ex3)
|
Establish criteria for escalating cybersecurity risks within enterprise risk management
|
|
Explain GV.RM-03.020.
|
Establish criteria for escalating cybersecurity risks within enterprise risk management
|
|
What is GV.RM-04?
|
Strategic direction that describes appropriate risk response options is established and communicated
|
|
Explain the requirement of GV.RM-04.
|
Strategic direction that describes appropriate risk response options is established and communicated
|
|
What outcome is expected by GV.RM-04?
|
Strategic direction that describes appropriate risk response options is established and communicated
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.