instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
Explain ID.AM-07.135.
|
Continuously discover and analyze ad hoc data to identify new instances of designated data types
|
|
What is ID.AM-07.136? (Ex3)
|
Assign data classifications to designated data types through tags or labels
|
|
Explain ID.AM-07.136.
|
Assign data classifications to designated data types through tags or labels
|
|
What is ID.AM-07.137? (Ex4)
|
Track the provenance, data owner, and geolocation of each instance of designated data types
|
|
Explain ID.AM-07.137.
|
Track the provenance, data owner, and geolocation of each instance of designated data types
|
|
What is ID.AM-08?
|
Systems, hardware, software, services, and data are managed throughout their life cycles
|
|
Explain the requirement of ID.AM-08.
|
Systems, hardware, software, services, and data are managed throughout their life cycles
|
|
What outcome is expected by ID.AM-08?
|
Systems, hardware, software, services, and data are managed throughout their life cycles
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.AM-08.138? (Ex1)
|
Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services
|
|
Explain ID.AM-08.138.
|
Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services
|
|
What is ID.AM-08.139? (Ex2)
|
Integrate cybersecurity considerations into product life cycles
|
|
Explain ID.AM-08.139.
|
Integrate cybersecurity considerations into product life cycles
|
|
What is ID.AM-08.140? (Ex3)
|
Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)
|
|
Explain ID.AM-08.140.
|
Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)
|
|
What is ID.AM-08.141? (Ex4)
|
Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface
|
|
Explain ID.AM-08.141.
|
Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface
|
|
What is ID.AM-08.142? (Ex5)
|
Properly configure and secure systems, hardware, software, and services prior to their deployment in production
|
|
Explain ID.AM-08.142.
|
Properly configure and secure systems, hardware, software, and services prior to their deployment in production
|
|
What is ID.AM-08.143? (Ex6)
|
Update inventories when systems, hardware, software, and services are moved or transferred within the organization
|
|
Explain ID.AM-08.143.
|
Update inventories when systems, hardware, software, and services are moved or transferred within the organization
|
|
What is ID.AM-08.144? (Ex7)
|
Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions
|
|
Explain ID.AM-08.144.
|
Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions
|
|
What is ID.AM-08.145? (Ex8)
|
Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement
|
|
Explain ID.AM-08.145.
|
Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement
|
|
What is ID.AM-08.146? (Ex9)
|
Offer methods for destroying paper, storage media, and other physical forms of data storage
|
|
Explain ID.AM-08.146.
|
Offer methods for destroying paper, storage media, and other physical forms of data storage
|
|
What is ID.RA? (Risk Assessment)
|
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
|
|
Summarize the scope of ID.RA.
|
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
|
|
What does ID.RA cover?
|
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
|
|
What is ID.RA-01?
|
Vulnerabilities in assets are identified, validated, and recorded
|
|
Explain the requirement of ID.RA-01.
|
Vulnerabilities in assets are identified, validated, and recorded
|
|
What outcome is expected by ID.RA-01?
|
Vulnerabilities in assets are identified, validated, and recorded
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.RA-01.147? (Ex1)
|
Use vulnerability management technologies to identify unpatched and misconfigured software
|
|
Explain ID.RA-01.147.
|
Use vulnerability management technologies to identify unpatched and misconfigured software
|
|
What is ID.RA-01.148? (Ex2)
|
Assess network and system architectures for design and implementation weaknesses that affect cybersecurity
|
|
Explain ID.RA-01.148.
|
Assess network and system architectures for design and implementation weaknesses that affect cybersecurity
|
|
What is ID.RA-01.149? (Ex3)
|
Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities
|
|
Explain ID.RA-01.149.
|
Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities
|
|
What is ID.RA-01.150? (Ex4)
|
Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues
|
|
Explain ID.RA-01.150.
|
Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues
|
|
What is ID.RA-01.151? (Ex5)
|
Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services
|
|
Explain ID.RA-01.151.
|
Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services
|
|
What is ID.RA-01.152? (Ex6)
|
Review processes and procedures for weaknesses that could be exploited to affect cybersecurity
|
|
Explain ID.RA-01.152.
|
Review processes and procedures for weaknesses that could be exploited to affect cybersecurity
|
|
What is ID.RA-02?
|
Cyber threat intelligence is received from information sharing forums and sources
|
|
Explain the requirement of ID.RA-02.
|
Cyber threat intelligence is received from information sharing forums and sources
|
|
What outcome is expected by ID.RA-02?
|
Cyber threat intelligence is received from information sharing forums and sources
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.RA-02.153? (Ex1)
|
Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
|
|
Explain ID.RA-02.153.
|
Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
|
|
What is ID.RA-02.154? (Ex2)
|
Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
|
|
Explain ID.RA-02.154.
|
Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
|
|
What is ID.RA-02.155? (Ex3)
|
Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have
|
|
Explain ID.RA-02.155.
|
Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have
|
|
What is ID.RA-03?
|
Internal and external threats to the organization are identified and recorded
|
|
Explain the requirement of ID.RA-03.
|
Internal and external threats to the organization are identified and recorded
|
|
What outcome is expected by ID.RA-03?
|
Internal and external threats to the organization are identified and recorded
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is ID.RA-03.156? (Ex1)
|
Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use
|
|
Explain ID.RA-03.156.
|
Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use
|
|
What is ID.RA-03.157? (Ex2)
|
Perform threat hunting to look for signs of threat actors within the environment
|
|
Explain ID.RA-03.157.
|
Perform threat hunting to look for signs of threat actors within the environment
|
|
What is ID.RA-03.158? (Ex3)
|
Implement processes for identifying internal threat actors
|
|
Explain ID.RA-03.158.
|
Implement processes for identifying internal threat actors
|
|
What is ID.RA-04?
|
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
|
|
Explain the requirement of ID.RA-04.
|
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
|
|
What outcome is expected by ID.RA-04?
|
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.RA-04.159? (Ex1)
|
Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers
|
|
Explain ID.RA-04.159.
|
Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers
|
|
What is ID.RA-04.160? (Ex2)
|
Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems
|
|
Explain ID.RA-04.160.
|
Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems
|
|
What is ID.RA-04.161? (Ex3)
|
Account for the potential impacts of cascading failures for systems of systems
|
|
Explain ID.RA-04.161.
|
Account for the potential impacts of cascading failures for systems of systems
|
|
What is ID.RA-05?
|
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
|
|
Explain the requirement of ID.RA-05.
|
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
|
|
What outcome is expected by ID.RA-05?
|
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.RA-05.162? (Ex1)
|
Develop threat models to better understand risks to the data and identify appropriate risk responses
|
|
Explain ID.RA-05.162.
|
Develop threat models to better understand risks to the data and identify appropriate risk responses
|
|
What is ID.RA-05.163? (Ex2)
|
Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts
|
|
Explain ID.RA-05.163.
|
Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts
|
|
What is ID.RA-06?
|
Risk responses are chosen, prioritized, planned, tracked, and communicated
|
|
Explain the requirement of ID.RA-06.
|
Risk responses are chosen, prioritized, planned, tracked, and communicated
|
|
What outcome is expected by ID.RA-06?
|
Risk responses are chosen, prioritized, planned, tracked, and communicated
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is ID.RA-06.164? (Ex1)
|
Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.