instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
Explain ID.RA-06.164.
Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk
What is ID.RA-06.165? (Ex2)
Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk
Explain ID.RA-06.165.
Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk
What is ID.RA-06.166? (Ex3)
Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)
Explain ID.RA-06.166.
Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)
What is ID.RA-06.167? (Ex4)
Use risk assessment findings to inform risk response decisions and actions
Explain ID.RA-06.167.
Use risk assessment findings to inform risk response decisions and actions
What is ID.RA-06.168? (Ex5)
Communicate planned risk responses to affected stakeholders in priority order
Explain ID.RA-06.168.
Communicate planned risk responses to affected stakeholders in priority order
What is ID.RA-07?
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
Explain the requirement of ID.RA-07.
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
What outcome is expected by ID.RA-07?
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
What is ID.RA-07.169? (Ex1)
Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions
Explain ID.RA-07.169.
Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions
What is ID.RA-07.170? (Ex2)
Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes
Explain ID.RA-07.170.
Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes
What is ID.RA-07.171? (Ex3)
Document the risks related to each requested exception and the plan for responding to those risks
Explain ID.RA-07.171.
Document the risks related to each requested exception and the plan for responding to those risks
What is ID.RA-07.172? (Ex4)
Periodically review risks that were accepted based upon planned future actions or milestones
Explain ID.RA-07.172.
Periodically review risks that were accepted based upon planned future actions or milestones
What is ID.RA-08?
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
Explain the requirement of ID.RA-08.
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
What outcome is expected by ID.RA-08?
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.RA-08.173? (Ex1)
Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts
Explain ID.RA-08.173.
Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts
What is ID.RA-08.174? (Ex2)
Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations
Explain ID.RA-08.174.
Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations
What is ID.RA-09?
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
Explain the requirement of ID.RA-09.
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
What outcome is expected by ID.RA-09?
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
What is ID.RA-09.175? (Ex1)
Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use
Explain ID.RA-09.175.
Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.RA-10?
Critical suppliers are assessed prior to acquisition
Explain the requirement of ID.RA-10.
Critical suppliers are assessed prior to acquisition
What outcome is expected by ID.RA-10?
Critical suppliers are assessed prior to acquisition
What is ID.RA-10.176? (Ex1)
Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain
Explain ID.RA-10.176.
Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain
What is ID.IM? (Improvement)
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
Summarize the scope of ID.IM.
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
What does ID.IM cover?
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
What is ID.IM-01?
Improvements are identified from evaluations
Explain the requirement of ID.IM-01.
Improvements are identified from evaluations
What outcome is expected by ID.IM-01?
Improvements are identified from evaluations
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.IM-01.177? (Ex1)
Perform self-assessments of critical services that take current threats and TTPs into consideration
Explain ID.IM-01.177.
Perform self-assessments of critical services that take current threats and TTPs into consideration
What is ID.IM-01.178? (Ex2)
Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement
Explain ID.IM-01.178.
Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement
What is ID.IM-01.179? (Ex3)
Constantly evaluate compliance with selected cybersecurity requirements through automated means
Explain ID.IM-01.179.
Constantly evaluate compliance with selected cybersecurity requirements through automated means
What is ID.IM-02?
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
Explain the requirement of ID.IM-02.
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
What outcome is expected by ID.IM-02?
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.IM-02.180? (Ex1)
Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)
Explain ID.IM-02.180.
Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)
What is ID.IM-02.181? (Ex2)
Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers
Explain ID.IM-02.181.
Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers
What is ID.IM-02.182? (Ex3)
Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate
Explain ID.IM-02.182.
Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate
What is ID.IM-02.183? (Ex4)
Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership
Explain ID.IM-02.183.
Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership
What is ID.IM-02.184? (Ex5)
Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt
Explain ID.IM-02.184.
Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt
What is ID.IM-02.185? (Ex6)
Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program
Explain ID.IM-02.185.
Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program
What is ID.IM-03?
Improvements are identified from execution of operational processes, procedures, and activities
Explain the requirement of ID.IM-03.
Improvements are identified from execution of operational processes, procedures, and activities
What outcome is expected by ID.IM-03?
Improvements are identified from execution of operational processes, procedures, and activities
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.IM-03.186? (Ex1)
Conduct collaborative lessons learned sessions with suppliers
Explain ID.IM-03.186.
Conduct collaborative lessons learned sessions with suppliers
What is ID.IM-03.187? (Ex2)
Annually review cybersecurity policies, processes, and procedures to take lessons learned into account
Explain ID.IM-03.187.
Annually review cybersecurity policies, processes, and procedures to take lessons learned into account
What is ID.IM-03.188? (Ex3)
Use metrics to assess operational cybersecurity performance over time
Explain ID.IM-03.188.
Use metrics to assess operational cybersecurity performance over time
What is ID.IM-04?
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
Explain the requirement of ID.IM-04.
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
What outcome is expected by ID.IM-04?
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.IM-04.189? (Ex1)
Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability
Explain ID.IM-04.189.
Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability
What is ID.IM-04.190? (Ex2)
Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans
Explain ID.IM-04.190.
Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans
What is ID.IM-04.191? (Ex3)
Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses
Explain ID.IM-04.191.
Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses
What is ID.IM-04.192? (Ex4)
Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties
Explain ID.IM-04.192.
Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties