instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
Explain ID.AM-07.135.
Continuously discover and analyze ad hoc data to identify new instances of designated data types
What is ID.AM-07.136? (Ex3)
Assign data classifications to designated data types through tags or labels
Explain ID.AM-07.136.
Assign data classifications to designated data types through tags or labels
What is ID.AM-07.137? (Ex4)
Track the provenance, data owner, and geolocation of each instance of designated data types
Explain ID.AM-07.137.
Track the provenance, data owner, and geolocation of each instance of designated data types
What is ID.AM-08?
Systems, hardware, software, services, and data are managed throughout their life cycles
Explain the requirement of ID.AM-08.
Systems, hardware, software, services, and data are managed throughout their life cycles
What outcome is expected by ID.AM-08?
Systems, hardware, software, services, and data are managed throughout their life cycles
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.AM-08.138? (Ex1)
Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services
Explain ID.AM-08.138.
Integrate cybersecurity considerations throughout the life cycles of systems, hardware, software, and services
What is ID.AM-08.139? (Ex2)
Integrate cybersecurity considerations into product life cycles
Explain ID.AM-08.139.
Integrate cybersecurity considerations into product life cycles
What is ID.AM-08.140? (Ex3)
Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)
Explain ID.AM-08.140.
Identify unofficial uses of technology to meet mission objectives (i.e., shadow IT)
What is ID.AM-08.141? (Ex4)
Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface
Explain ID.AM-08.141.
Periodically identify redundant systems, hardware, software, and services that unnecessarily increase the organization's attack surface
What is ID.AM-08.142? (Ex5)
Properly configure and secure systems, hardware, software, and services prior to their deployment in production
Explain ID.AM-08.142.
Properly configure and secure systems, hardware, software, and services prior to their deployment in production
What is ID.AM-08.143? (Ex6)
Update inventories when systems, hardware, software, and services are moved or transferred within the organization
Explain ID.AM-08.143.
Update inventories when systems, hardware, software, and services are moved or transferred within the organization
What is ID.AM-08.144? (Ex7)
Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions
Explain ID.AM-08.144.
Securely destroy stored data based on the organization's data retention policy using the prescribed destruction method, and keep and manage a record of the destructions
What is ID.AM-08.145? (Ex8)
Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement
Explain ID.AM-08.145.
Securely sanitize data storage when hardware is being retired, decommissioned, reassigned, or sent for repairs or replacement
What is ID.AM-08.146? (Ex9)
Offer methods for destroying paper, storage media, and other physical forms of data storage
Explain ID.AM-08.146.
Offer methods for destroying paper, storage media, and other physical forms of data storage
What is ID.RA? (Risk Assessment)
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
Summarize the scope of ID.RA.
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
What does ID.RA cover?
The cybersecurity risk to the organization, assets, and individuals is understood by the organization
What is ID.RA-01?
Vulnerabilities in assets are identified, validated, and recorded
Explain the requirement of ID.RA-01.
Vulnerabilities in assets are identified, validated, and recorded
What outcome is expected by ID.RA-01?
Vulnerabilities in assets are identified, validated, and recorded
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.RA-01.147? (Ex1)
Use vulnerability management technologies to identify unpatched and misconfigured software
Explain ID.RA-01.147.
Use vulnerability management technologies to identify unpatched and misconfigured software
What is ID.RA-01.148? (Ex2)
Assess network and system architectures for design and implementation weaknesses that affect cybersecurity
Explain ID.RA-01.148.
Assess network and system architectures for design and implementation weaknesses that affect cybersecurity
What is ID.RA-01.149? (Ex3)
Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities
Explain ID.RA-01.149.
Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities
What is ID.RA-01.150? (Ex4)
Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues
Explain ID.RA-01.150.
Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues
What is ID.RA-01.151? (Ex5)
Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services
Explain ID.RA-01.151.
Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services
What is ID.RA-01.152? (Ex6)
Review processes and procedures for weaknesses that could be exploited to affect cybersecurity
Explain ID.RA-01.152.
Review processes and procedures for weaknesses that could be exploited to affect cybersecurity
What is ID.RA-02?
Cyber threat intelligence is received from information sharing forums and sources
Explain the requirement of ID.RA-02.
Cyber threat intelligence is received from information sharing forums and sources
What outcome is expected by ID.RA-02?
Cyber threat intelligence is received from information sharing forums and sources
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.RA-02.153? (Ex1)
Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
Explain ID.RA-02.153.
Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
What is ID.RA-02.154? (Ex2)
Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
Explain ID.RA-02.154.
Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
What is ID.RA-02.155? (Ex3)
Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have
Explain ID.RA-02.155.
Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have
What is ID.RA-03?
Internal and external threats to the organization are identified and recorded
Explain the requirement of ID.RA-03.
Internal and external threats to the organization are identified and recorded
What outcome is expected by ID.RA-03?
Internal and external threats to the organization are identified and recorded
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is ID.RA-03.156? (Ex1)
Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use
Explain ID.RA-03.156.
Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use
What is ID.RA-03.157? (Ex2)
Perform threat hunting to look for signs of threat actors within the environment
Explain ID.RA-03.157.
Perform threat hunting to look for signs of threat actors within the environment
What is ID.RA-03.158? (Ex3)
Implement processes for identifying internal threat actors
Explain ID.RA-03.158.
Implement processes for identifying internal threat actors
What is ID.RA-04?
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
Explain the requirement of ID.RA-04.
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
What outcome is expected by ID.RA-04?
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.RA-04.159? (Ex1)
Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers
Explain ID.RA-04.159.
Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers
What is ID.RA-04.160? (Ex2)
Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems
Explain ID.RA-04.160.
Enumerate the potential business impacts of unauthorized access to the organization's communications, systems, and data processed in or by those systems
What is ID.RA-04.161? (Ex3)
Account for the potential impacts of cascading failures for systems of systems
Explain ID.RA-04.161.
Account for the potential impacts of cascading failures for systems of systems
What is ID.RA-05?
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
Explain the requirement of ID.RA-05.
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
What outcome is expected by ID.RA-05?
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.RA-05.162? (Ex1)
Develop threat models to better understand risks to the data and identify appropriate risk responses
Explain ID.RA-05.162.
Develop threat models to better understand risks to the data and identify appropriate risk responses
What is ID.RA-05.163? (Ex2)
Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts
Explain ID.RA-05.163.
Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts
What is ID.RA-06?
Risk responses are chosen, prioritized, planned, tracked, and communicated
Explain the requirement of ID.RA-06.
Risk responses are chosen, prioritized, planned, tracked, and communicated
What outcome is expected by ID.RA-06?
Risk responses are chosen, prioritized, planned, tracked, and communicated
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is ID.RA-06.164? (Ex1)
Apply the vulnerability management plan's criteria for deciding whether to accept, transfer, mitigate, or avoid risk