instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
---|---|---|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-04.021? (Ex1)
|
Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data
|
|
Explain GV.RM-04.021.
|
Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data
|
|
What is GV.RM-04.022? (Ex2)
|
Determine whether to purchase cybersecurity insurance
|
|
Explain GV.RM-04.022.
|
Determine whether to purchase cybersecurity insurance
|
|
What is GV.RM-04.023? (Ex3)
|
Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)
|
|
Explain GV.RM-04.023.
|
Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)
|
|
What is GV.RM-05?
|
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
|
|
Explain the requirement of GV.RM-05.
|
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
|
|
What outcome is expected by GV.RM-05?
|
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RM-05.024? (Ex1)
|
Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals
|
|
Explain GV.RM-05.024.
|
Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals
|
|
What is GV.RM-05.025? (Ex2)
|
Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks
|
|
Explain GV.RM-05.025.
|
Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks
|
|
What is GV.RM-06?
|
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
|
|
Explain the requirement of GV.RM-06.
|
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
|
|
What outcome is expected by GV.RM-06?
|
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-06.026? (Ex1)
|
Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas
|
|
Explain GV.RM-06.026.
|
Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas
|
|
What is GV.RM-06.027? (Ex2)
|
Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)
|
|
Explain GV.RM-06.027.
|
Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)
|
|
What is GV.RM-06.028? (Ex3)
|
Establish criteria for risk prioritization at the appropriate levels within the enterprise
|
|
Explain GV.RM-06.028.
|
Establish criteria for risk prioritization at the appropriate levels within the enterprise
|
|
What is GV.RM-06.029? (Ex4)
|
Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks
|
|
Explain GV.RM-06.029.
|
Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks
|
|
What is GV.RM-07?
|
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
|
|
Explain the requirement of GV.RM-07.
|
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
|
|
What outcome is expected by GV.RM-07?
|
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RM-07.030? (Ex1)
|
Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)
|
|
Explain GV.RM-07.030.
|
Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)
|
|
What is GV.RM-07.031? (Ex2)
|
Identify stretch goals and document them
|
|
Explain GV.RM-07.031.
|
Identify stretch goals and document them
|
|
What is GV.RM-07.032? (Ex3)
|
Calculate, document, and prioritize positive risks alongside negative risks
|
|
Explain GV.RM-07.032.
|
Calculate, document, and prioritize positive risks alongside negative risks
|
|
What is GV.RR? (Roles, Responsibilities, and Authorities)
|
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
|
|
Summarize the scope of GV.RR.
|
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
|
|
What does GV.RR cover?
|
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
|
|
What is GV.RR-01?
|
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
|
|
Explain the requirement of GV.RR-01.
|
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
|
|
What outcome is expected by GV.RR-01?
|
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RR-01.033? (Ex1)
|
Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy
|
|
Explain GV.RR-01.033.
|
Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy
|
|
What is GV.RR-01.034? (Ex2)
|
Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management
|
|
Explain GV.RR-01.034.
|
Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management
|
|
What is GV.RR-01.035? (Ex3)
|
Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events
|
|
Explain GV.RR-01.035.
|
Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events
|
|
What is GV.RR-01.036? (Ex4)
|
Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk
|
|
Explain GV.RR-01.036.
|
Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk
|
|
What is GV.RR-02?
|
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
|
|
Explain the requirement of GV.RR-02.
|
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
|
|
What outcome is expected by GV.RR-02?
|
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RR-02.037? (Ex1)
|
Document risk management roles and responsibilities in policy
|
|
Explain GV.RR-02.037.
|
Document risk management roles and responsibilities in policy
|
|
What is GV.RR-02.038? (Ex2)
|
Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed
|
|
Explain GV.RR-02.038.
|
Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed
|
|
What is GV.RR-02.039? (Ex3)
|
Include cybersecurity responsibilities and performance requirements in personnel descriptions
|
|
Explain GV.RR-02.039.
|
Include cybersecurity responsibilities and performance requirements in personnel descriptions
|
|
What is GV.RR-02.040? (Ex4)
|
Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement
|
|
Explain GV.RR-02.040.
|
Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement
|
|
What is GV.RR-02.041? (Ex5)
|
Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions
|
|
Explain GV.RR-02.041.
|
Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions
|
|
What is GV.RR-03?
|
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
|
|
Explain the requirement of GV.RR-03.
|
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
|
|
What outcome is expected by GV.RR-03?
|
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is GV.RR-03.042? (Ex1)
|
Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority
|
|
Explain GV.RR-03.042.
|
Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority
|
|
What is GV.RR-03.043? (Ex2)
|
Identify resource allocation and investment in line with risk tolerance and response
|
|
Explain GV.RR-03.043.
|
Identify resource allocation and investment in line with risk tolerance and response
|
|
What is GV.RR-03.044? (Ex3)
|
Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy
|
|
Explain GV.RR-03.044.
|
Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy
|
|
What is GV.RR-04?
|
Cybersecurity is included in human resources practices
|
|
Explain the requirement of GV.RR-04.
|
Cybersecurity is included in human resources practices
|
|
What outcome is expected by GV.RR-04?
|
Cybersecurity is included in human resources practices
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is GV.RR-04.045? (Ex1)
|
Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)
|
|
Explain GV.RR-04.045.
|
Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)
|
|
What is GV.RR-04.046? (Ex2)
|
Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions
|
|
Explain GV.RR-04.046.
|
Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions
|
|
What is GV.RR-04.047? (Ex3)
|
Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles
|
|
Explain GV.RR-04.047.
|
Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles
|
|
What is GV.RR-04.048? (Ex4)
|
Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles
|
|
Explain GV.RR-04.048.
|
Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.