instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
---|---|---|
What is PR.PT-04?
|
Communications and control networks are protected
|
|
Explain the requirement of PR.PT-04.
|
Communications and control networks are protected
|
|
What outcome is expected by PR.PT-04?
|
Communications and control networks are protected
|
|
What is WR-PR.PT-04?
|
Incorporated into PR.AA-06, PR.IR-01
|
|
Explain WR-PR.PT-04.
|
Incorporated into PR.AA-06, PR.IR-01
|
|
What is PR.PT-05?
|
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
|
|
Explain the requirement of PR.PT-05.
|
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
|
|
What outcome is expected by PR.PT-05?
|
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
|
|
What is WR-PR.PT-05?
|
Moved to PR.IR-03
|
|
Explain WR-PR.PT-05.
|
Moved to PR.IR-03
|
|
What is DE.CM-04?
|
Malicious code is detected
|
|
Explain the requirement of DE.CM-04.
|
Malicious code is detected
|
|
What outcome is expected by DE.CM-04?
|
Malicious code is detected
|
|
What is WR-DE.CM-04?
|
Incorporated into DE.CM-01, DE.CM-09
|
|
Explain WR-DE.CM-04.
|
Incorporated into DE.CM-01, DE.CM-09
|
|
What is DE.CM-05?
|
Unauthorized mobile code is detected
|
|
Explain the requirement of DE.CM-05.
|
Unauthorized mobile code is detected
|
|
What outcome is expected by DE.CM-05?
|
Unauthorized mobile code is detected
|
|
What is WR-DE.CM-05?
|
Incorporated into DE.CM-01, DE.CM-09
|
|
Explain WR-DE.CM-05.
|
Incorporated into DE.CM-01, DE.CM-09
|
|
What is DE.CM-07?
|
Monitoring for unauthorized personnel, connections, devices, and software is performed
|
|
Explain the requirement of DE.CM-07.
|
Monitoring for unauthorized personnel, connections, devices, and software is performed
|
|
What outcome is expected by DE.CM-07?
|
Monitoring for unauthorized personnel, connections, devices, and software is performed
|
|
What is WR-DE.CM-07?
|
Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09
|
|
Explain WR-DE.CM-07.
|
Incorporated into DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09
|
|
What is DE.CM-08?
|
Vulnerability scans are performed
|
|
Explain the requirement of DE.CM-08.
|
Vulnerability scans are performed
|
|
What outcome is expected by DE.CM-08?
|
Vulnerability scans are performed
|
|
What is WR-DE.CM-08?
|
Incorporated into ID.RA-01
|
|
Explain WR-DE.CM-08.
|
Incorporated into ID.RA-01
|
|
What is DE.AE-01?
|
A baseline of network operations and expected data flows for users and systems is established and managed
|
|
Explain the requirement of DE.AE-01.
|
A baseline of network operations and expected data flows for users and systems is established and managed
|
|
What outcome is expected by DE.AE-01?
|
A baseline of network operations and expected data flows for users and systems is established and managed
|
|
What is WR-DE.AE-01?
|
Incorporated into ID.AM-03
|
|
Explain WR-DE.AE-01.
|
Incorporated into ID.AM-03
|
|
What is DE.AE-05?
|
Incident alert thresholds are established
|
|
Explain the requirement of DE.AE-05.
|
Incident alert thresholds are established
|
|
What outcome is expected by DE.AE-05?
|
Incident alert thresholds are established
|
|
What is WR-DE.AE-05?
|
Moved to DE.AE-08
|
|
Explain WR-DE.AE-05.
|
Moved to DE.AE-08
|
|
What is WR-DE.DP?
|
Incorporated into other Categories and Functions
|
|
Explain WR-DE.DP.
|
Incorporated into other Categories and Functions
|
|
What is DE.DP-01?
|
Roles and responsibilities for detection are well defined to ensure accountability
|
|
Explain the requirement of DE.DP-01.
|
Roles and responsibilities for detection are well defined to ensure accountability
|
|
What outcome is expected by DE.DP-01?
|
Roles and responsibilities for detection are well defined to ensure accountability
|
|
What is WR-DE.DP-01?
|
Incorporated into GV.RR-02
|
|
Explain WR-DE.DP-01.
|
Incorporated into GV.RR-02
|
|
What is DE.DP-02?
|
Detection activities comply with all applicable requirements
|
|
Explain the requirement of DE.DP-02.
|
Detection activities comply with all applicable requirements
|
|
What outcome is expected by DE.DP-02?
|
Detection activities comply with all applicable requirements
|
|
What is WR-DE.DP-02?
|
Incorporated into DE.AE
|
|
Explain WR-DE.DP-02.
|
Incorporated into DE.AE
|
|
What is DE.DP-03?
|
Detection processes are tested
|
|
Explain the requirement of DE.DP-03.
|
Detection processes are tested
|
|
What outcome is expected by DE.DP-03?
|
Detection processes are tested
|
|
What is WR-DE.DP-03?
|
Incorporated into ID.IM-02
|
|
Explain WR-DE.DP-03.
|
Incorporated into ID.IM-02
|
|
What is DE.DP-04?
|
Event detection information is communicated
|
|
Explain the requirement of DE.DP-04.
|
Event detection information is communicated
|
|
What outcome is expected by DE.DP-04?
|
Event detection information is communicated
|
|
What is WR-DE.DP-04?
|
Incorporated into DE.AE-06
|
|
Explain WR-DE.DP-04.
|
Incorporated into DE.AE-06
|
|
What is DE.DP-05?
|
Detection processes are continuously improved
|
|
Explain the requirement of DE.DP-05.
|
Detection processes are continuously improved
|
|
What outcome is expected by DE.DP-05?
|
Detection processes are continuously improved
|
|
What is WR-DE.DP-05?
|
Incorporated into ID.IM, ID.IM-03
|
|
Explain WR-DE.DP-05.
|
Incorporated into ID.IM, ID.IM-03
|
|
What is WR-RS.RP?
|
Incorporated into RS.MA
|
|
Explain WR-RS.RP.
|
Incorporated into RS.MA
|
|
What is RS.RP-01?
|
Response plan is executed during or after an incident
|
|
Explain the requirement of RS.RP-01.
|
Response plan is executed during or after an incident
|
|
What outcome is expected by RS.RP-01?
|
Response plan is executed during or after an incident
|
|
What is WR-RS.RP-01?
|
Incorporated into RS.MA-01
|
|
Explain WR-RS.RP-01.
|
Incorporated into RS.MA-01
|
|
What is RS.AN-01?
|
Notifications from detection systems are investigated
|
|
Explain the requirement of RS.AN-01.
|
Notifications from detection systems are investigated
|
|
What outcome is expected by RS.AN-01?
|
Notifications from detection systems are investigated
|
|
What is WR-RS.AN-01?
|
Incorporated into RS.MA-02
|
|
Explain WR-RS.AN-01.
|
Incorporated into RS.MA-02
|
|
What is RS.AN-02?
|
The impact of the incident is understood
|
|
Explain the requirement of RS.AN-02.
|
The impact of the incident is understood
|
|
What outcome is expected by RS.AN-02?
|
The impact of the incident is understood
|
|
What is WR-RS.AN-02?
|
Incorporated into RS.MA-02, RS.MA-03, RS.MA-04
|
|
Explain WR-RS.AN-02.
|
Incorporated into RS.MA-02, RS.MA-03, RS.MA-04
|
|
What is RS.AN-04?
|
Incidents are categorized consistent with response plans
|
|
Explain the requirement of RS.AN-04.
|
Incidents are categorized consistent with response plans
|
|
What outcome is expected by RS.AN-04?
|
Incidents are categorized consistent with response plans
|
|
What is WR-RS.AN-04?
|
Moved to RS.MA-03
|
|
Explain WR-RS.AN-04.
|
Moved to RS.MA-03
|
|
What is RS.AN-05?
|
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
|
|
Explain the requirement of RS.AN-05.
|
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
|
|
What outcome is expected by RS.AN-05?
|
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
|
|
What is WR-RS.AN-05?
|
Moved to ID.RA-08
|
|
Explain WR-RS.AN-05.
|
Moved to ID.RA-08
|
|
What is RS.CO-01?
|
Personnel know their roles and order of operations when a response is needed
|
|
Explain the requirement of RS.CO-01.
|
Personnel know their roles and order of operations when a response is needed
|
|
What outcome is expected by RS.CO-01?
|
Personnel know their roles and order of operations when a response is needed
|
|
What is WR-RS.CO-01?
|
Incorporated into PR.AT-01
|
|
Explain WR-RS.CO-01.
|
Incorporated into PR.AT-01
|
|
What is RS.CO-04?
|
Coordination with stakeholders occurs consistent with response plans
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.