instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is PR.PT-04?
Communications and control networks are protected
Explain the requirement of PR.PT-04.
Communications and control networks are protected
What outcome is expected by PR.PT-04?
Communications and control networks are protected
What is WR-PR.PT-04?
Incorporated into PR.AA-06, PR.IR-01
Explain WR-PR.PT-04.
Incorporated into PR.AA-06, PR.IR-01
What is PR.PT-05?
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
Explain the requirement of PR.PT-05.
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
What outcome is expected by PR.PT-05?
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
What is WR-PR.PT-05?
Moved to PR.IR-03
Explain WR-PR.PT-05.
Moved to PR.IR-03
What is DE.CM-04?
Malicious code is detected
Explain the requirement of DE.CM-04.
Malicious code is detected
What outcome is expected by DE.CM-04?
Malicious code is detected
What is WR-DE.CM-04?
Incorporated into DE.CM-01, DE.CM-09
Explain WR-DE.CM-04.
Incorporated into DE.CM-01, DE.CM-09
What is DE.CM-05?
Unauthorized mobile code is detected
Explain the requirement of DE.CM-05.
Unauthorized mobile code is detected
What outcome is expected by DE.CM-05?
Unauthorized mobile code is detected
What is WR-DE.CM-05?
Incorporated into DE.CM-01, DE.CM-09
Explain WR-DE.CM-05.
Incorporated into DE.CM-01, DE.CM-09
What is DE.CM-07?
Monitoring for unauthorized personnel, connections, devices, and software is performed
Explain the requirement of DE.CM-07.
Monitoring for unauthorized personnel, connections, devices, and software is performed
What outcome is expected by DE.CM-07?
Monitoring for unauthorized personnel, connections, devices, and software is performed
What is WR-DE.CM-07?
Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09
Explain WR-DE.CM-07.
Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09
What is DE.CM-08?
Vulnerability scans are performed
Explain the requirement of DE.CM-08.
Vulnerability scans are performed
What outcome is expected by DE.CM-08?
Vulnerability scans are performed
What is WR-DE.CM-08?
Incorporated into ID.RA-01
Explain WR-DE.CM-08.
Incorporated into ID.RA-01
What is DE.AE-01?
A baseline of network operations and expected data flows for users and systems is established and managed
Explain the requirement of DE.AE-01.
A baseline of network operations and expected data flows for users and systems is established and managed
What outcome is expected by DE.AE-01?
A baseline of network operations and expected data flows for users and systems is established and managed
What is WR-DE.AE-01?
Incorporated into ID.AM-03
Explain WR-DE.AE-01.
Incorporated into ID.AM-03
What is DE.AE-05?
Incident alert thresholds are established
Explain the requirement of DE.AE-05.
Incident alert thresholds are established
What outcome is expected by DE.AE-05?
Incident alert thresholds are established
What is WR-DE.AE-05?
Moved to DE.AE-08
Explain WR-DE.AE-05.
Moved to DE.AE-08
What is WR-DE.DP?
Incorporated into other Categories and Functions
Explain WR-DE.DP.
Incorporated into other Categories and Functions
What is DE.DP-01?
Roles and responsibilities for detection are well defined to ensure accountability
Explain the requirement of DE.DP-01.
Roles and responsibilities for detection are well defined to ensure accountability
What outcome is expected by DE.DP-01?
Roles and responsibilities for detection are well defined to ensure accountability
What is WR-DE.DP-01?
Incorporated into GV.RR-02
Explain WR-DE.DP-01.
Incorporated into GV.RR-02
What is DE.DP-02?
Detection activities comply with all applicable requirements
Explain the requirement of DE.DP-02.
Detection activities comply with all applicable requirements
What outcome is expected by DE.DP-02?
Detection activities comply with all applicable requirements
What is WR-DE.DP-02?
Incorporated into DE.AE
Explain WR-DE.DP-02.
Incorporated into DE.AE
What is DE.DP-03?
Detection processes are tested
Explain the requirement of DE.DP-03.
Detection processes are tested
What outcome is expected by DE.DP-03?
Detection processes are tested
What is WR-DE.DP-03?
Incorporated into ID.IM-02
Explain WR-DE.DP-03.
Incorporated into ID.IM-02
What is DE.DP-04?
Event detection information is communicated
Explain the requirement of DE.DP-04.
Event detection information is communicated
What outcome is expected by DE.DP-04?
Event detection information is communicated
What is WR-DE.DP-04?
Incorporated into DE.AE-06
Explain WR-DE.DP-04.
Incorporated into DE.AE-06
What is DE.DP-05?
Detection processes are continuously improved
Explain the requirement of DE.DP-05.
Detection processes are continuously improved
What outcome is expected by DE.DP-05?
Detection processes are continuously improved
What is WR-DE.DP-05?
Incorporated into ID.IM, ID.IM-03
Explain WR-DE.DP-05.
Incorporated into ID.IM, ID.IM-03
What is WR-RS.RP?
Incorporated into RS.MA
Explain WR-RS.RP.
Incorporated into RS.MA
What is RS.RP-01?
Response plan is executed during or after an incident
Explain the requirement of RS.RP-01.
Response plan is executed during or after an incident
What outcome is expected by RS.RP-01?
Response plan is executed during or after an incident
What is WR-RS.RP-01?
Incorporated into RS.MA-01
Explain WR-RS.RP-01.
Incorporated into RS.MA-01
What is RS.AN-01?
Notifications from detection systems are investigated
Explain the requirement of RS.AN-01.
Notifications from detection systems are investigated
What outcome is expected by RS.AN-01?
Notifications from detection systems are investigated
What is WR-RS.AN-01?
Incorporated into RS.MA-02
Explain WR-RS.AN-01.
Incorporated into RS.MA-02
What is RS.AN-02?
The impact of the incident is understood
Explain the requirement of RS.AN-02.
The impact of the incident is understood
What outcome is expected by RS.AN-02?
The impact of the incident is understood
What is WR-RS.AN-02?
Incorporated into RS.MA-02, RS.MA-03, RS.MA-04
Explain WR-RS.AN-02.
Incorporated into RS.MA-02, RS.MA-03, RS.MA-04
What is RS.AN-04?
Incidents are categorized consistent with response plans
Explain the requirement of RS.AN-04.
Incidents are categorized consistent with response plans
What outcome is expected by RS.AN-04?
Incidents are categorized consistent with response plans
What is WR-RS.AN-04?
Moved to RS.MA-03
Explain WR-RS.AN-04.
Moved to RS.MA-03
What is RS.AN-05?
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
Explain the requirement of RS.AN-05.
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
What outcome is expected by RS.AN-05?
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
What is WR-RS.AN-05?
Moved to ID.RA-08
Explain WR-RS.AN-05.
Moved to ID.RA-08
What is RS.CO-01?
Personnel know their roles and order of operations when a response is needed
Explain the requirement of RS.CO-01.
Personnel know their roles and order of operations when a response is needed
What outcome is expected by RS.CO-01?
Personnel know their roles and order of operations when a response is needed
What is WR-RS.CO-01?
Incorporated into PR.AT-01
Explain WR-RS.CO-01.
Incorporated into PR.AT-01
What is RS.CO-04?
Coordination with stakeholders occurs consistent with response plans