instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
Explain ID.RA-06.164.
|
Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk
|
|
What is ID.RA-06.165? (Ex2)
|
Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk
|
|
Explain ID.RA-06.165.
|
Apply the vulnerability management plan's criteria for selecting compensating controls to mitigate risk
|
|
What is ID.RA-06.166? (Ex3)
|
Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)
|
|
Explain ID.RA-06.166.
|
Track the progress of risk response implementation (e.g., plan of action and milestones [POA&M], risk register, risk detail report)
|
|
What is ID.RA-06.167? (Ex4)
|
Use risk assessment findings to inform risk response decisions and actions
|
|
Explain ID.RA-06.167.
|
Use risk assessment findings to inform risk response decisions and actions
|
|
What is ID.RA-06.168? (Ex5)
|
Communicate planned risk responses to affected stakeholders in priority order
|
|
Explain ID.RA-06.168.
|
Communicate planned risk responses to affected stakeholders in priority order
|
|
What is ID.RA-07?
|
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
|
|
Explain the requirement of ID.RA-07.
|
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
|
|
What outcome is expected by ID.RA-07?
|
Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
|
|
What is ID.RA-07.169? (Ex1)
|
Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions
|
|
Explain ID.RA-07.169.
|
Implement and follow procedures for the formal documentation, review, testing, and approval of proposed changes and requested exceptions
|
|
What is ID.RA-07.170? (Ex2)
|
Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes
|
|
Explain ID.RA-07.170.
|
Document the possible risks of making or not making each proposed change, and provide guidance on rolling back changes
|
|
What is ID.RA-07.171? (Ex3)
|
Document the risks related to each requested exception and the plan for responding to those risks
|
|
Explain ID.RA-07.171.
|
Document the risks related to each requested exception and the plan for responding to those risks
|
|
What is ID.RA-07.172? (Ex4)
|
Periodically review risks that were accepted based upon planned future actions or milestones
|
|
Explain ID.RA-07.172.
|
Periodically review risks that were accepted based upon planned future actions or milestones
|
|
What is ID.RA-08?
|
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
|
|
Explain the requirement of ID.RA-08.
|
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
|
|
What outcome is expected by ID.RA-08?
|
Processes for receiving, analyzing, and responding to vulnerability disclosures are established
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.RA-08.173? (Ex1)
|
Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts
|
|
Explain ID.RA-08.173.
|
Conduct vulnerability information sharing between the organization and its suppliers following the rules and protocols defined in contracts
|
|
What is ID.RA-08.174? (Ex2)
|
Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations
|
|
Explain ID.RA-08.174.
|
Assign responsibilities and verify the execution of procedures for processing, analyzing the impact of, and responding to cybersecurity threat, vulnerability, or incident disclosures by suppliers, customers, partners, and government cybersecurity organizations
|
|
What is ID.RA-09?
|
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
|
|
Explain the requirement of ID.RA-09.
|
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
|
|
What outcome is expected by ID.RA-09?
|
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
|
|
What is ID.RA-09.175? (Ex1)
|
Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use
|
|
Explain ID.RA-09.175.
|
Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.RA-10?
|
Critical suppliers are assessed prior to acquisition
|
|
Explain the requirement of ID.RA-10.
|
Critical suppliers are assessed prior to acquisition
|
|
What outcome is expected by ID.RA-10?
|
Critical suppliers are assessed prior to acquisition
|
|
What is ID.RA-10.176? (Ex1)
|
Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain
|
|
Explain ID.RA-10.176.
|
Conduct supplier risk assessments against business and applicable cybersecurity requirements, including the supply chain
|
|
What is ID.IM? (Improvement)
|
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
|
|
Summarize the scope of ID.IM.
|
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
|
|
What does ID.IM cover?
|
Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions
|
|
What is ID.IM-01?
|
Improvements are identified from evaluations
|
|
Explain the requirement of ID.IM-01.
|
Improvements are identified from evaluations
|
|
What outcome is expected by ID.IM-01?
|
Improvements are identified from evaluations
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.IM-01.177? (Ex1)
|
Perform self-assessments of critical services that take current threats and TTPs into consideration
|
|
Explain ID.IM-01.177.
|
Perform self-assessments of critical services that take current threats and TTPs into consideration
|
|
What is ID.IM-01.178? (Ex2)
|
Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement
|
|
Explain ID.IM-01.178.
|
Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement
|
|
What is ID.IM-01.179? (Ex3)
|
Constantly evaluate compliance with selected cybersecurity requirements through automated means
|
|
Explain ID.IM-01.179.
|
Constantly evaluate compliance with selected cybersecurity requirements through automated means
|
|
What is ID.IM-02?
|
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
|
|
Explain the requirement of ID.IM-02.
|
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
|
|
What outcome is expected by ID.IM-02?
|
Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.IM-02.180? (Ex1)
|
Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)
|
|
Explain ID.IM-02.180.
|
Identify improvements for future incident response activities based on findings from incident response assessments (e.g., tabletop exercises and simulations, tests, internal reviews, independent audits)
|
|
What is ID.IM-02.181? (Ex2)
|
Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers
|
|
Explain ID.IM-02.181.
|
Identify improvements for future business continuity, disaster recovery, and incident response activities based on exercises performed in coordination with critical service providers and product suppliers
|
|
What is ID.IM-02.182? (Ex3)
|
Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate
|
|
Explain ID.IM-02.182.
|
Involve internal stakeholders (e.g., senior executives, legal department, HR) in security tests and exercises as appropriate
|
|
What is ID.IM-02.183? (Ex4)
|
Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership
|
|
Explain ID.IM-02.183.
|
Perform penetration testing to identify opportunities to improve the security posture of selected high-risk systems as approved by leadership
|
|
What is ID.IM-02.184? (Ex5)
|
Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt
|
|
Explain ID.IM-02.184.
|
Exercise contingency plans for responding to and recovering from the discovery that products or services did not originate with the contracted supplier or partner or were altered before receipt
|
|
What is ID.IM-02.185? (Ex6)
|
Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program
|
|
Explain ID.IM-02.185.
|
Collect and analyze performance metrics using security tools and services to inform improvements to the cybersecurity program
|
|
What is ID.IM-03?
|
Improvements are identified from execution of operational processes, procedures, and activities
|
|
Explain the requirement of ID.IM-03.
|
Improvements are identified from execution of operational processes, procedures, and activities
|
|
What outcome is expected by ID.IM-03?
|
Improvements are identified from execution of operational processes, procedures, and activities
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.IM-03.186? (Ex1)
|
Conduct collaborative lessons learned sessions with suppliers
|
|
Explain ID.IM-03.186.
|
Conduct collaborative lessons learned sessions with suppliers
|
|
What is ID.IM-03.187? (Ex2)
|
Annually review cybersecurity policies, processes, and procedures to take lessons learned into account
|
|
Explain ID.IM-03.187.
|
Annually review cybersecurity policies, processes, and procedures to take lessons learned into account
|
|
What is ID.IM-03.188? (Ex3)
|
Use metrics to assess operational cybersecurity performance over time
|
|
Explain ID.IM-03.188.
|
Use metrics to assess operational cybersecurity performance over time
|
|
What is ID.IM-04?
|
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
|
|
Explain the requirement of ID.IM-04.
|
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
|
|
What outcome is expected by ID.IM-04?
|
Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.IM-04.189? (Ex1)
|
Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability
|
|
Explain ID.IM-04.189.
|
Establish contingency plans (e.g., incident response, business continuity, disaster recovery) for responding to and recovering from adverse events that can interfere with operations, expose confidential information, or otherwise endanger the organization's mission and viability
|
|
What is ID.IM-04.190? (Ex2)
|
Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans
|
|
Explain ID.IM-04.190.
|
Include contact and communication information, processes for handling common scenarios, and criteria for prioritization, escalation, and elevation in all contingency plans
|
|
What is ID.IM-04.191? (Ex3)
|
Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses
|
|
Explain ID.IM-04.191.
|
Create a vulnerability management plan to identify and assess all types of vulnerabilities and to prioritize, test, and implement risk responses
|
|
What is ID.IM-04.192? (Ex4)
|
Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties
|
|
Explain ID.IM-04.192.
|
Communicate cybersecurity plans (including updates) to those responsible for carrying them out and to affected parties
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.