instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is WR-ID.SC?
Incorporated into GV.SC
Explain WR-ID.SC.
Incorporated into GV.SC
What is ID.SC-01?
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
Explain the requirement of ID.SC-01.
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
What outcome is expected by ID.SC-01?
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
What is WR-ID.SC-01?
Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10
Explain WR-ID.SC-01.
Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10
What is ID.SC-02?
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
Explain the requirement of ID.SC-02.
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
What outcome is expected by ID.SC-02?
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
What is WR-ID.SC-02?
Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10
Explain WR-ID.SC-02.
Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10
What is ID.SC-03?
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
Explain the requirement of ID.SC-03.
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
What outcome is expected by ID.SC-03?
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
What is WR-ID.SC-03?
Moved to GV.SC-05
Explain WR-ID.SC-03.
Moved to GV.SC-05
What is ID.SC-04?
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
Explain the requirement of ID.SC-04.
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
What outcome is expected by ID.SC-04?
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
What is WR-ID.SC-04?
Incorporated into GV.SC-07, ID.RA-10
Explain WR-ID.SC-04.
Incorporated into GV.SC-07, ID.RA-10
What is ID.SC-05?
Response and recovery planning and testing are conducted with suppliers and third-party providers
Explain the requirement of ID.SC-05.
Response and recovery planning and testing are conducted with suppliers and third-party providers
What outcome is expected by ID.SC-05?
Response and recovery planning and testing are conducted with suppliers and third-party providers
What is WR-ID.SC-05?
Incorporated into GV.SC-08, ID.IM-02
Explain WR-ID.SC-05.
Incorporated into GV.SC-08, ID.IM-02
What is WR-PR.AC?
Moved to PR.AA
Explain WR-PR.AC.
Moved to PR.AA
What is PR.AC-01?
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
Explain the requirement of PR.AC-01.
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
What outcome is expected by PR.AC-01?
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
What is WR-PR.AC-01?
Incorporated into PR.AA-01, PR.AA-05
Explain WR-PR.AC-01.
Incorporated into PR.AA-01, PR.AA-05
What is PR.AC-02?
Physical access to assets is managed and protected
Explain the requirement of PR.AC-02.
Physical access to assets is managed and protected
What outcome is expected by PR.AC-02?
Physical access to assets is managed and protected
What is WR-PR.AC-02?
Moved to PR.AA-06
Explain WR-PR.AC-02.
Moved to PR.AA-06
What is PR.AC-03?
Remote access is managed
Explain the requirement of PR.AC-03.
Remote access is managed
What outcome is expected by PR.AC-03?
Remote access is managed
What is WR-PR.AC-03?
Incorporated into PR.AA-03, PR.AA-05, PR.IR-01
Explain WR-PR.AC-03.
Incorporated into PR.AA-03, PR.AA-05, PR.IR-01
What is PR.AC-04?
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
Explain the requirement of PR.AC-04.
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
What outcome is expected by PR.AC-04?
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
What is WR-PR.AC-04?
Moved to PR.AA-05
Explain WR-PR.AC-04.
Moved to PR.AA-05
What is PR.AC-05?
Network integrity is protected (e.g., network segregation, network segmentation)
Explain the requirement of PR.AC-05.
Network integrity is protected (e.g., network segregation, network segmentation)
What outcome is expected by PR.AC-05?
Network integrity is protected (e.g., network segregation, network segmentation)
What is WR-PR.AC-05?
Incorporated into PR.IR-01
Explain WR-PR.AC-05.
Incorporated into PR.IR-01
What is PR.AC-06?
Identities are proofed and bound to credentials and asserted in interactions
Explain the requirement of PR.AC-06.
Identities are proofed and bound to credentials and asserted in interactions
What outcome is expected by PR.AC-06?
Identities are proofed and bound to credentials and asserted in interactions
What is WR-PR.AC-06?
Moved to PR.AA-02
Explain WR-PR.AC-06.
Moved to PR.AA-02
What is PR.AC-07?
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
Explain the requirement of PR.AC-07.
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
What outcome is expected by PR.AC-07?
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
What is WR-PR.AC-07?
Moved to PR.AA-03
Explain WR-PR.AC-07.
Moved to PR.AA-03
What is PR.AT-03?
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
Explain the requirement of PR.AT-03.
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
What outcome is expected by PR.AT-03?
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
What is WR-PR.AT-03?
Incorporated into PR.AT-01, PR.AT-02
Explain WR-PR.AT-03.
Incorporated into PR.AT-01, PR.AT-02
What is PR.AT-04?
Senior executives understand their roles and responsibilities
Explain the requirement of PR.AT-04.
Senior executives understand their roles and responsibilities
What outcome is expected by PR.AT-04?
Senior executives understand their roles and responsibilities
What is WR-PR.AT-04?
Incorporated into PR.AT-02
Explain WR-PR.AT-04.
Incorporated into PR.AT-02
What is PR.AT-05?
Physical and cybersecurity personnel understand their roles and responsibilities
Explain the requirement of PR.AT-05.
Physical and cybersecurity personnel understand their roles and responsibilities
What outcome is expected by PR.AT-05?
Physical and cybersecurity personnel understand their roles and responsibilities
What is WR-PR.AT-05?
Incorporated into PR.AT-02
Explain WR-PR.AT-05.
Incorporated into PR.AT-02
What is PR.DS-03?
Assets are formally managed throughout removal, transfers, and disposition
Explain the requirement of PR.DS-03.
Assets are formally managed throughout removal, transfers, and disposition
What outcome is expected by PR.DS-03?
Assets are formally managed throughout removal, transfers, and disposition
What is WR-PR.DS-03?
Incorporated into ID.AM-08, PR.PS-03
Explain WR-PR.DS-03.
Incorporated into ID.AM-08, PR.PS-03
What is PR.DS-04?
Adequate capacity to ensure availability is maintained
Explain the requirement of PR.DS-04.
Adequate capacity to ensure availability is maintained
What outcome is expected by PR.DS-04?
Adequate capacity to ensure availability is maintained
What is WR-PR.DS-04?
Moved to PR.IR-04
Explain WR-PR.DS-04.
Moved to PR.IR-04
What is PR.DS-05?
Protections against data leaks are implemented
Explain the requirement of PR.DS-05.
Protections against data leaks are implemented
What outcome is expected by PR.DS-05?
Protections against data leaks are implemented
What is WR-PR.DS-05?
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
Explain WR-PR.DS-05.
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
What is PR.DS-06?
Integrity checking mechanisms are used to verify software, firmware, and information integrity
Explain the requirement of PR.DS-06.
Integrity checking mechanisms are used to verify software, firmware, and information integrity
What outcome is expected by PR.DS-06?
Integrity checking mechanisms are used to verify software, firmware, and information integrity
What is WR-PR.DS-06?
Incorporated into PR.DS-01, DE.CM-09
Explain WR-PR.DS-06.
Incorporated into PR.DS-01, DE.CM-09
What is PR.DS-07?
The development and testing environment(s) are separate from the production environment