instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
What does PR.AA cover?
|
Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access
|
|
What is PR.AA-01?
|
Identities and credentials for authorized users, services, and hardware are managed by the organization
|
|
Explain the requirement of PR.AA-01.
|
Identities and credentials for authorized users, services, and hardware are managed by the organization
|
|
What outcome is expected by PR.AA-01?
|
Identities and credentials for authorized users, services, and hardware are managed by the organization
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.AA-01.194? (Ex1)
|
Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed
|
|
Explain PR.AA-01.194.
|
Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed
|
|
What is PR.AA-01.195? (Ex2)
|
Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials
|
|
Explain PR.AA-01.195.
|
Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials
|
|
What is PR.AA-01.196? (Ex3)
|
Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device
|
|
Explain PR.AA-01.196.
|
Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device
|
|
What is PR.AA-01.197? (Ex4)
|
Physically label authorized hardware with an identifier for inventory and servicing purposes
|
|
Explain PR.AA-01.197.
|
Physically label authorized hardware with an identifier for inventory and servicing purposes
|
|
What is PR.AA-02?
|
Identities are proofed and bound to credentials based on the context of interactions
|
|
Explain the requirement of PR.AA-02.
|
Identities are proofed and bound to credentials based on the context of interactions
|
|
What outcome is expected by PR.AA-02?
|
Identities are proofed and bound to credentials based on the context of interactions
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is PR.AA-02.198? (Ex1)
|
Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)
|
|
Explain PR.AA-02.198.
|
Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)
|
|
What is PR.AA-02.199? (Ex2)
|
Issue a different credential for each person (i.e., no credential sharing)
|
|
Explain PR.AA-02.199.
|
Issue a different credential for each person (i.e., no credential sharing)
|
|
What is PR.AA-03?
|
Users, services, and hardware are authenticated
|
|
Explain the requirement of PR.AA-03.
|
Users, services, and hardware are authenticated
|
|
What outcome is expected by PR.AA-03?
|
Users, services, and hardware are authenticated
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.AA-03.200? (Ex1)
|
Require multifactor authentication
|
|
Explain PR.AA-03.200.
|
Require multifactor authentication
|
|
What is PR.AA-03.201? (Ex2)
|
Enforce policies for the minimum strength of passwords, PINs, and similar authenticators
|
|
Explain PR.AA-03.201.
|
Enforce policies for the minimum strength of passwords, PINs, and similar authenticators
|
|
What is PR.AA-03.202? (Ex3)
|
Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)
|
|
Explain PR.AA-03.202.
|
Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)
|
|
What is PR.AA-03.203? (Ex4)
|
Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions
|
|
Explain PR.AA-03.203.
|
Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions
|
|
What is PR.AA-04?
|
Identity assertions are protected, conveyed, and verified
|
|
Explain the requirement of PR.AA-04.
|
Identity assertions are protected, conveyed, and verified
|
|
What outcome is expected by PR.AA-04?
|
Identity assertions are protected, conveyed, and verified
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.AA-04.204? (Ex1)
|
Protect identity assertions that are used to convey authentication and user information through single sign-on systems
|
|
Explain PR.AA-04.204.
|
Protect identity assertions that are used to convey authentication and user information through single sign-on systems
|
|
What is PR.AA-04.205? (Ex2)
|
Protect identity assertions that are used to convey authentication and user information between federated systems
|
|
Explain PR.AA-04.205.
|
Protect identity assertions that are used to convey authentication and user information between federated systems
|
|
What is PR.AA-04.206? (Ex3)
|
Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions
|
|
Explain PR.AA-04.206.
|
Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions
|
|
What is PR.AA-05?
|
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
|
|
Explain the requirement of PR.AA-05.
|
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
|
|
What outcome is expected by PR.AA-05?
|
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.AA-05.207? (Ex1)
|
Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed
|
|
Explain PR.AA-05.207.
|
Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed
|
|
What is PR.AA-05.208? (Ex2)
|
Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)
|
|
Explain PR.AA-05.208.
|
Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)
|
|
What is PR.AA-05.209? (Ex3)
|
Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)
|
|
Explain PR.AA-05.209.
|
Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)
|
|
What is PR.AA-05.210? (Ex4)
|
Periodically review the privileges associated with critical business functions to confirm proper separation of duties
|
|
Explain PR.AA-05.210.
|
Periodically review the privileges associated with critical business functions to confirm proper separation of duties
|
|
What is PR.AA-06?
|
Physical access to assets is managed, monitored, and enforced commensurate with risk
|
|
Explain the requirement of PR.AA-06.
|
Physical access to assets is managed, monitored, and enforced commensurate with risk
|
|
What outcome is expected by PR.AA-06?
|
Physical access to assets is managed, monitored, and enforced commensurate with risk
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
|
What is PR.AA-06.211? (Ex1)
|
Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access
|
|
Explain PR.AA-06.211.
|
Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access
|
|
What is PR.AA-06.212? (Ex2)
|
Employ additional physical security controls for areas that contain high-risk assets
|
|
Explain PR.AA-06.212.
|
Employ additional physical security controls for areas that contain high-risk assets
|
|
What is PR.AA-06.213? (Ex3)
|
Escort guests, vendors, and other third parties within areas that contain business-critical assets
|
|
Explain PR.AA-06.213.
|
Escort guests, vendors, and other third parties within areas that contain business-critical assets
|
|
What is PR.AT? (Awareness and Training)
|
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
|
|
Summarize the scope of PR.AT.
|
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
|
|
What does PR.AT cover?
|
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
|
|
What is PR.AT-01?
|
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
|
|
Explain the requirement of PR.AT-01.
|
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
|
|
What outcome is expected by PR.AT-01?
|
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.AT-01.214? (Ex1)
|
Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources
|
|
Explain PR.AT-01.214.
|
Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources
|
|
What is PR.AT-01.215? (Ex2)
|
Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)
|
|
Explain PR.AT-01.215.
|
Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)
|
|
What is PR.AT-01.216? (Ex3)
|
Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole
|
|
Explain PR.AT-01.216.
|
Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole
|
|
What is PR.AT-01.217? (Ex4)
|
Periodically assess or test users on their understanding of basic cybersecurity practices
|
|
Explain PR.AT-01.217.
|
Periodically assess or test users on their understanding of basic cybersecurity practices
|
|
What is PR.AT-01.218? (Ex5)
|
Require annual refreshers to reinforce existing practices and introduce new practices
|
|
Explain PR.AT-01.218.
|
Require annual refreshers to reinforce existing practices and introduce new practices
|
|
What is PR.AT-02?
|
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
|
|
Explain the requirement of PR.AT-02.
|
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
|
|
What outcome is expected by PR.AT-02?
|
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is third? (3rd)
|
3rd Party Risk
|
|
Explain third.
|
3rd Party Risk
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.