instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-04.021? (Ex1)
Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data
Explain GV.RM-04.021.
Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data
What is GV.RM-04.022? (Ex2)
Determine whether to purchase cybersecurity insurance
Explain GV.RM-04.022.
Determine whether to purchase cybersecurity insurance
What is GV.RM-04.023? (Ex3)
Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)
Explain GV.RM-04.023.
Document conditions under which shared responsibility models are acceptable (e.g., outsourcing certain cybersecurity functions, having a third party perform financial transactions on behalf of the organization, using public cloud-based services)
What is GV.RM-05?
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
Explain the requirement of GV.RM-05.
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
What outcome is expected by GV.RM-05?
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RM-05.024? (Ex1)
Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals
Explain GV.RM-05.024.
Determine how to update senior executives, directors, and management on the organization's cybersecurity posture at agreed-upon intervals
What is GV.RM-05.025? (Ex2)
Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks
Explain GV.RM-05.025.
Identify how all departments across the organization - such as management, operations, internal auditors, legal, acquisition, physical security, and HR - will communicate with each other about cybersecurity risks
What is GV.RM-06?
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Explain the requirement of GV.RM-06.
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
What outcome is expected by GV.RM-06?
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-06.026? (Ex1)
Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas
Explain GV.RM-06.026.
Establish criteria for using a quantitative approach to cybersecurity risk analysis, and specify probability and exposure formulas
What is GV.RM-06.027? (Ex2)
Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)
Explain GV.RM-06.027.
Create and use templates (e.g., a risk register) to document cybersecurity risk information (e.g., risk description, exposure, treatment, and ownership)
What is GV.RM-06.028? (Ex3)
Establish criteria for risk prioritization at the appropriate levels within the enterprise
Explain GV.RM-06.028.
Establish criteria for risk prioritization at the appropriate levels within the enterprise
What is GV.RM-06.029? (Ex4)
Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks
Explain GV.RM-06.029.
Use a consistent list of risk categories to support integrating, aggregating, and comparing cybersecurity risks
What is GV.RM-07?
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
Explain the requirement of GV.RM-07.
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
What outcome is expected by GV.RM-07?
Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RM-07.030? (Ex1)
Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)
Explain GV.RM-07.030.
Define and communicate guidance and methods for identifying opportunities and including them in risk discussions (e.g., strengths, weaknesses, opportunities, and threats [SWOT] analysis)
What is GV.RM-07.031? (Ex2)
Identify stretch goals and document them
Explain GV.RM-07.031.
Identify stretch goals and document them
What is GV.RM-07.032? (Ex3)
Calculate, document, and prioritize positive risks alongside negative risks
Explain GV.RM-07.032.
Calculate, document, and prioritize positive risks alongside negative risks
What is GV.RR? (Roles, Responsibilities, and Authorities)
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
Summarize the scope of GV.RR.
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
What does GV.RR cover?
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
What is GV.RR-01?
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
Explain the requirement of GV.RR-01.
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
What outcome is expected by GV.RR-01?
Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RR-01.033? (Ex1)
Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy
Explain GV.RR-01.033.
Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization's cybersecurity strategy
What is GV.RR-01.034? (Ex2)
Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management
Explain GV.RR-01.034.
Share leaders' expectations regarding a secure and ethical culture, especially when current events present the opportunity to highlight positive or negative examples of cybersecurity risk management
What is GV.RR-01.035? (Ex3)
Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events
Explain GV.RR-01.035.
Leaders direct the CISO to maintain a comprehensive cybersecurity risk strategy and review and update it at least annually and after major events
What is GV.RR-01.036? (Ex4)
Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk
Explain GV.RR-01.036.
Conduct reviews to ensure adequate authority and coordination among those responsible for managing cybersecurity risk
What is GV.RR-02?
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
Explain the requirement of GV.RR-02.
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
What outcome is expected by GV.RR-02?
Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RR-02.037? (Ex1)
Document risk management roles and responsibilities in policy
Explain GV.RR-02.037.
Document risk management roles and responsibilities in policy
What is GV.RR-02.038? (Ex2)
Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed
Explain GV.RR-02.038.
Document who is responsible and accountable for cybersecurity risk management activities and how those teams and individuals are to be consulted and informed
What is GV.RR-02.039? (Ex3)
Include cybersecurity responsibilities and performance requirements in personnel descriptions
Explain GV.RR-02.039.
Include cybersecurity responsibilities and performance requirements in personnel descriptions
What is GV.RR-02.040? (Ex4)
Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement
Explain GV.RR-02.040.
Document performance goals for personnel with cybersecurity risk management responsibilities, and periodically measure performance to identify areas for improvement
What is GV.RR-02.041? (Ex5)
Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions
Explain GV.RR-02.041.
Clearly articulate cybersecurity responsibilities within operations, risk functions, and internal audit functions
What is GV.RR-03?
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
Explain the requirement of GV.RR-03.
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
What outcome is expected by GV.RR-03?
Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is GV.RR-03.042? (Ex1)
Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority
Explain GV.RR-03.042.
Conduct periodic management reviews to ensure that those given cybersecurity risk management responsibilities have the necessary authority
What is GV.RR-03.043? (Ex2)
Identify resource allocation and investment in line with risk tolerance and response
Explain GV.RR-03.043.
Identify resource allocation and investment in line with risk tolerance and response
What is GV.RR-03.044? (Ex3)
Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy
Explain GV.RR-03.044.
Provide adequate and sufficient people, process, and technical resources to support the cybersecurity strategy
What is GV.RR-04?
Cybersecurity is included in human resources practices
Explain the requirement of GV.RR-04.
Cybersecurity is included in human resources practices
What outcome is expected by GV.RR-04?
Cybersecurity is included in human resources practices
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is GV.RR-04.045? (Ex1)
Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)
Explain GV.RR-04.045.
Integrate cybersecurity risk management considerations into human resources processes (e.g., personnel screening, onboarding, change notification, offboarding)
What is GV.RR-04.046? (Ex2)
Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions
Explain GV.RR-04.046.
Consider cybersecurity knowledge to be a positive factor in hiring, training, and retention decisions
What is GV.RR-04.047? (Ex3)
Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles
Explain GV.RR-04.047.
Conduct background checks prior to onboarding new personnel for sensitive roles, and periodically repeat background checks for personnel with such roles
What is GV.RR-04.048? (Ex4)
Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles
Explain GV.RR-04.048.
Define and enforce obligations for personnel to be aware of, adhere to, and uphold security policies as they relate to their roles