instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
---|---|---|
What is WR-ID.SC?
|
Incorporated into GV.SC
|
|
Explain WR-ID.SC.
|
Incorporated into GV.SC
|
|
What is ID.SC-01?
|
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
|
|
Explain the requirement of ID.SC-01.
|
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
|
|
What outcome is expected by ID.SC-01?
|
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
|
|
What is WR-ID.SC-01?
|
Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10
|
|
Explain WR-ID.SC-01.
|
Incorporated into GV.RM-05, GV.SC-01, GV.SC-06, GV.SC-09, GV.SC-10
|
|
What is ID.SC-02?
|
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
|
|
Explain the requirement of ID.SC-02.
|
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
|
|
What outcome is expected by ID.SC-02?
|
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
|
|
What is WR-ID.SC-02?
|
Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10
|
|
Explain WR-ID.SC-02.
|
Incorporated into GV.OC-02, GV.SC-03, GV.SC-04, GV.SC-07, ID.RA-10
|
|
What is ID.SC-03?
|
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
|
|
Explain the requirement of ID.SC-03.
|
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
|
|
What outcome is expected by ID.SC-03?
|
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
|
|
What is WR-ID.SC-03?
|
Moved to GV.SC-05
|
|
Explain WR-ID.SC-03.
|
Moved to GV.SC-05
|
|
What is ID.SC-04?
|
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
|
|
Explain the requirement of ID.SC-04.
|
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
|
|
What outcome is expected by ID.SC-04?
|
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
|
|
What is WR-ID.SC-04?
|
Incorporated into GV.SC-07, ID.RA-10
|
|
Explain WR-ID.SC-04.
|
Incorporated into GV.SC-07, ID.RA-10
|
|
What is ID.SC-05?
|
Response and recovery planning and testing are conducted with suppliers and third-party providers
|
|
Explain the requirement of ID.SC-05.
|
Response and recovery planning and testing are conducted with suppliers and third-party providers
|
|
What outcome is expected by ID.SC-05?
|
Response and recovery planning and testing are conducted with suppliers and third-party providers
|
|
What is WR-ID.SC-05?
|
Incorporated into GV.SC-08, ID.IM-02
|
|
Explain WR-ID.SC-05.
|
Incorporated into GV.SC-08, ID.IM-02
|
|
What is WR-PR.AC?
|
Moved to PR.AA
|
|
Explain WR-PR.AC.
|
Moved to PR.AA
|
|
What is PR.AC-01?
|
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
|
|
Explain the requirement of PR.AC-01.
|
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
|
|
What outcome is expected by PR.AC-01?
|
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
|
|
What is WR-PR.AC-01?
|
Incorporated into PR.AA-01, PR.AA-05
|
|
Explain WR-PR.AC-01.
|
Incorporated into PR.AA-01, PR.AA-05
|
|
What is PR.AC-02?
|
Physical access to assets is managed and protected
|
|
Explain the requirement of PR.AC-02.
|
Physical access to assets is managed and protected
|
|
What outcome is expected by PR.AC-02?
|
Physical access to assets is managed and protected
|
|
What is WR-PR.AC-02?
|
Moved to PR.AA-06
|
|
Explain WR-PR.AC-02.
|
Moved to PR.AA-06
|
|
What is PR.AC-03?
|
Remote access is managed
|
|
Explain the requirement of PR.AC-03.
|
Remote access is managed
|
|
What outcome is expected by PR.AC-03?
|
Remote access is managed
|
|
What is WR-PR.AC-03?
|
Incorporated into PR.AA-03, PR.AA-05, PR.IR-01
|
|
Explain WR-PR.AC-03.
|
Incorporated into PR.AA-03, PR.AA-05, PR.IR-01
|
|
What is PR.AC-04?
|
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
|
|
Explain the requirement of PR.AC-04.
|
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
|
|
What outcome is expected by PR.AC-04?
|
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
|
|
What is WR-PR.AC-04?
|
Moved to PR.AA-05
|
|
Explain WR-PR.AC-04.
|
Moved to PR.AA-05
|
|
What is PR.AC-05?
|
Network integrity is protected (e.g., network segregation, network segmentation)
|
|
Explain the requirement of PR.AC-05.
|
Network integrity is protected (e.g., network segregation, network segmentation)
|
|
What outcome is expected by PR.AC-05?
|
Network integrity is protected (e.g., network segregation, network segmentation)
|
|
What is WR-PR.AC-05?
|
Incorporated into PR.IR-01
|
|
Explain WR-PR.AC-05.
|
Incorporated into PR.IR-01
|
|
What is PR.AC-06?
|
Identities are proofed and bound to credentials and asserted in interactions
|
|
Explain the requirement of PR.AC-06.
|
Identities are proofed and bound to credentials and asserted in interactions
|
|
What outcome is expected by PR.AC-06?
|
Identities are proofed and bound to credentials and asserted in interactions
|
|
What is WR-PR.AC-06?
|
Moved to PR.AA-02
|
|
Explain WR-PR.AC-06.
|
Moved to PR.AA-02
|
|
What is PR.AC-07?
|
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
|
|
Explain the requirement of PR.AC-07.
|
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
|
|
What outcome is expected by PR.AC-07?
|
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
|
|
What is WR-PR.AC-07?
|
Moved to PR.AA-03
|
|
Explain WR-PR.AC-07.
|
Moved to PR.AA-03
|
|
What is PR.AT-03?
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-03.
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-03?
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
What is WR-PR.AT-03?
|
Incorporated into PR.AT-01, PR.AT-02
|
|
Explain WR-PR.AT-03.
|
Incorporated into PR.AT-01, PR.AT-02
|
|
What is PR.AT-04?
|
Senior executives understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-04.
|
Senior executives understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-04?
|
Senior executives understand their roles and responsibilities
|
|
What is WR-PR.AT-04?
|
Incorporated into PR.AT-02
|
|
Explain WR-PR.AT-04.
|
Incorporated into PR.AT-02
|
|
What is PR.AT-05?
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-05.
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-05?
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
What is WR-PR.AT-05?
|
Incorporated into PR.AT-02
|
|
Explain WR-PR.AT-05.
|
Incorporated into PR.AT-02
|
|
What is PR.DS-03?
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
Explain the requirement of PR.DS-03.
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
What outcome is expected by PR.DS-03?
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
What is WR-PR.DS-03?
|
Incorporated into ID.AM-08, PR.PS-03
|
|
Explain WR-PR.DS-03.
|
Incorporated into ID.AM-08, PR.PS-03
|
|
What is PR.DS-04?
|
Adequate capacity to ensure availability is maintained
|
|
Explain the requirement of PR.DS-04.
|
Adequate capacity to ensure availability is maintained
|
|
What outcome is expected by PR.DS-04?
|
Adequate capacity to ensure availability is maintained
|
|
What is WR-PR.DS-04?
|
Moved to PR.IR-04
|
|
Explain WR-PR.DS-04.
|
Moved to PR.IR-04
|
|
What is PR.DS-05?
|
Protections against data leaks are implemented
|
|
Explain the requirement of PR.DS-05.
|
Protections against data leaks are implemented
|
|
What outcome is expected by PR.DS-05?
|
Protections against data leaks are implemented
|
|
What is WR-PR.DS-05?
|
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
|
|
Explain WR-PR.DS-05.
|
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
|
|
What is PR.DS-06?
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
Explain the requirement of PR.DS-06.
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
What outcome is expected by PR.DS-06?
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
What is WR-PR.DS-06?
|
Incorporated into PR.DS-01, DE.CM-09
|
|
Explain WR-PR.DS-06.
|
Incorporated into PR.DS-01, DE.CM-09
|
|
What is PR.DS-07?
|
The development and testing environment(s) are separate from the production environment
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.