instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
Explain the requirement of PR.DS-07.
|
The development and testing environment(s) are separate from the production environment
|
|
What outcome is expected by PR.DS-07?
|
The development and testing environment(s) are separate from the production environment
|
|
What is WR-PR.DS-07?
|
Incorporated into PR.IR-01
|
|
Explain WR-PR.DS-07.
|
Incorporated into PR.IR-01
|
|
What is PR.DS-08?
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
Explain the requirement of PR.DS-08.
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
What outcome is expected by PR.DS-08?
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
What is WR-PR.DS-08?
|
Incorporated into ID.RA-09, DE.CM-09
|
|
Explain WR-PR.DS-08.
|
Incorporated into ID.RA-09, DE.CM-09
|
|
What is WR-PR.IP?
|
Incorporated into other Categories and Functions
|
|
Explain WR-PR.IP.
|
Incorporated into other Categories and Functions
|
|
What is PR.IP-01?
|
A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)
|
|
Explain the requirement of PR.IP-01.
|
A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)
|
|
What outcome is expected by PR.IP-01?
|
A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)
|
|
What is WR-PR.IP-01?
|
Incorporated into PR.PS-01
|
|
Explain WR-PR.IP-01.
|
Incorporated into PR.PS-01
|
|
What is PR.IP-02?
|
A System Development Life Cycle to manage systems is implemented
|
|
Explain the requirement of PR.IP-02.
|
A System Development Life Cycle to manage systems is implemented
|
|
What outcome is expected by PR.IP-02?
|
A System Development Life Cycle to manage systems is implemented
|
|
What is WR-PR.IP-02?
|
Incorporated into ID.AM-08, PR.PS-06
|
|
Explain WR-PR.IP-02.
|
Incorporated into ID.AM-08, PR.PS-06
|
|
What is PR.IP-03?
|
Configuration change control processes are in place
|
|
Explain the requirement of PR.IP-03.
|
Configuration change control processes are in place
|
|
What outcome is expected by PR.IP-03?
|
Configuration change control processes are in place
|
|
What is WR-PR.IP-03?
|
Incorporated into PR.PS-01, ID.RA-07
|
|
Explain WR-PR.IP-03.
|
Incorporated into PR.PS-01, ID.RA-07
|
|
What is PR.IP-04?
|
Backups of information are conducted, maintained, and tested
|
|
Explain the requirement of PR.IP-04.
|
Backups of information are conducted, maintained, and tested
|
|
What outcome is expected by PR.IP-04?
|
Backups of information are conducted, maintained, and tested
|
|
What is WR-PR.IP-04?
|
Moved to PR.DS-11
|
|
Explain WR-PR.IP-04.
|
Moved to PR.DS-11
|
|
What is PR.IP-05?
|
Policy and regulations regarding the physical operating environment for organizational assets are met
|
|
Explain the requirement of PR.IP-05.
|
Policy and regulations regarding the physical operating environment for organizational assets are met
|
|
What outcome is expected by PR.IP-05?
|
Policy and regulations regarding the physical operating environment for organizational assets are met
|
|
What is WR-PR.IP-05?
|
Moved to PR.IR-02
|
|
Explain WR-PR.IP-05.
|
Moved to PR.IR-02
|
|
What is PR.IP-06?
|
Data is destroyed according to policy
|
|
Explain the requirement of PR.IP-06.
|
Data is destroyed according to policy
|
|
What outcome is expected by PR.IP-06?
|
Data is destroyed according to policy
|
|
What is WR-PR.IP-06?
|
Incorporated into ID.AM-08
|
|
Explain WR-PR.IP-06.
|
Incorporated into ID.AM-08
|
|
What is PR.IP-07?
|
Protection processes are improved
|
|
Explain the requirement of PR.IP-07.
|
Protection processes are improved
|
|
What outcome is expected by PR.IP-07?
|
Protection processes are improved
|
|
What is WR-PR.IP-07?
|
Incorporated into ID.IM, ID.IM-03
|
|
Explain WR-PR.IP-07.
|
Incorporated into ID.IM, ID.IM-03
|
|
What is PR.IP-08?
|
Effectiveness of protection technologies is shared
|
|
Explain the requirement of PR.IP-08.
|
Effectiveness of protection technologies is shared
|
|
What outcome is expected by PR.IP-08?
|
Effectiveness of protection technologies is shared
|
|
What is WR-PR.IP-08?
|
Moved to ID.IM-03
|
|
Explain WR-PR.IP-08.
|
Moved to ID.IM-03
|
|
What is PR.IP-09?
|
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed
|
|
Explain the requirement of PR.IP-09.
|
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed
|
|
What outcome is expected by PR.IP-09?
|
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed
|
|
What is WR-PR.IP-09?
|
Moved to ID.IM-04
|
|
Explain WR-PR.IP-09.
|
Moved to ID.IM-04
|
|
What is PR.IP-10?
|
Response and recovery plans are tested
|
|
Explain the requirement of PR.IP-10.
|
Response and recovery plans are tested
|
|
What outcome is expected by PR.IP-10?
|
Response and recovery plans are tested
|
|
What is WR-PR.IP-10?
|
Incorporated into ID.IM-02, ID.IM-04
|
|
Explain WR-PR.IP-10.
|
Incorporated into ID.IM-02, ID.IM-04
|
|
What is PR.IP-11?
|
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)
|
|
Explain the requirement of PR.IP-11.
|
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)
|
|
What outcome is expected by PR.IP-11?
|
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)
|
|
What is WR-PR.IP-11?
|
Moved to GV.RR-04
|
|
Explain WR-PR.IP-11.
|
Moved to GV.RR-04
|
|
What is PR.IP-12?
|
A vulnerability management plan is developed and implemented
|
|
Explain the requirement of PR.IP-12.
|
A vulnerability management plan is developed and implemented
|
|
What outcome is expected by PR.IP-12?
|
A vulnerability management plan is developed and implemented
|
|
What is WR-PR.IP-12?
|
Incorporated into ID.RA-01, PR.PS-02
|
|
Explain WR-PR.IP-12.
|
Incorporated into ID.RA-01, PR.PS-02
|
|
What is WR-PR.MA?
|
Incorporated into ID.AM-08
|
|
Explain WR-PR.MA.
|
Incorporated into ID.AM-08
|
|
What is PR.MA-01?
|
Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools
|
|
Explain the requirement of PR.MA-01.
|
Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools
|
|
What outcome is expected by PR.MA-01?
|
Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools
|
|
What is WR-PR.MA-01?
|
Incorporated into ID.AM-08, PR.PS-03
|
|
Explain WR-PR.MA-01.
|
Incorporated into ID.AM-08, PR.PS-03
|
|
What is PR.MA-02?
|
Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access
|
|
Explain the requirement of PR.MA-02.
|
Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access
|
|
What outcome is expected by PR.MA-02?
|
Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access
|
|
What is WR-PR.MA-02?
|
Incorporated into ID.AM-08, PR.PS-02
|
|
Explain WR-PR.MA-02.
|
Incorporated into ID.AM-08, PR.PS-02
|
|
What is WR-PR.PT?
|
Incorporated into other Protect Categories
|
|
Explain WR-PR.PT.
|
Incorporated into other Protect Categories
|
|
What is PR.PT-01?
|
Audit/log records are determined, documented, implemented, and reviewed in accordance with policy
|
|
Explain the requirement of PR.PT-01.
|
Audit/log records are determined, documented, implemented, and reviewed in accordance with policy
|
|
What outcome is expected by PR.PT-01?
|
Audit/log records are determined, documented, implemented, and reviewed in accordance with policy
|
|
What is WR-PR.PT-01?
|
Incorporated into PR.PS-04
|
|
Explain WR-PR.PT-01.
|
Incorporated into PR.PS-04
|
|
What is PR.PT-02?
|
Removable media is protected and its use restricted according to policy
|
|
Explain the requirement of PR.PT-02.
|
Removable media is protected and its use restricted according to policy
|
|
What outcome is expected by PR.PT-02?
|
Removable media is protected and its use restricted according to policy
|
|
What is WR-PR.PT-02?
|
Incorporated into PR.DS-01, PR.PS-01
|
|
Explain WR-PR.PT-02.
|
Incorporated into PR.DS-01, PR.PS-01
|
|
What is PR.PT-03?
|
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities
|
|
Explain the requirement of PR.PT-03.
|
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities
|
|
What outcome is expected by PR.PT-03?
|
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities
|
|
What is WR-PR.PT-03?
|
Incorporated into PR.PS-01
|
|
Explain WR-PR.PT-03.
|
Incorporated into PR.PS-01
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.