instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What does PR.AA cover?
Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access
What is PR.AA-01?
Identities and credentials for authorized users, services, and hardware are managed by the organization
Explain the requirement of PR.AA-01.
Identities and credentials for authorized users, services, and hardware are managed by the organization
What outcome is expected by PR.AA-01?
Identities and credentials for authorized users, services, and hardware are managed by the organization
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.AA-01.194? (Ex1)
Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed
Explain PR.AA-01.194.
Initiate requests for new access or additional access for employees, contractors, and others, and track, review, and fulfill the requests, with permission from system or data owners when needed
What is PR.AA-01.195? (Ex2)
Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials
Explain PR.AA-01.195.
Issue, manage, and revoke cryptographic certificates and identity tokens, cryptographic keys (i.e., key management), and other credentials
What is PR.AA-01.196? (Ex3)
Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device
Explain PR.AA-01.196.
Select a unique identifier for each device from immutable hardware characteristics or an identifier securely provisioned to the device
What is PR.AA-01.197? (Ex4)
Physically label authorized hardware with an identifier for inventory and servicing purposes
Explain PR.AA-01.197.
Physically label authorized hardware with an identifier for inventory and servicing purposes
What is PR.AA-02?
Identities are proofed and bound to credentials based on the context of interactions
Explain the requirement of PR.AA-02.
Identities are proofed and bound to credentials based on the context of interactions
What outcome is expected by PR.AA-02?
Identities are proofed and bound to credentials based on the context of interactions
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is PR.AA-02.198? (Ex1)
Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)
Explain PR.AA-02.198.
Verify a person's claimed identity at enrollment time using government-issued identity credentials (e.g., passport, visa, driver's license)
What is PR.AA-02.199? (Ex2)
Issue a different credential for each person (i.e., no credential sharing)
Explain PR.AA-02.199.
Issue a different credential for each person (i.e., no credential sharing)
What is PR.AA-03?
Users, services, and hardware are authenticated
Explain the requirement of PR.AA-03.
Users, services, and hardware are authenticated
What outcome is expected by PR.AA-03?
Users, services, and hardware are authenticated
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.AA-03.200? (Ex1)
Require multifactor authentication
Explain PR.AA-03.200.
Require multifactor authentication
What is PR.AA-03.201? (Ex2)
Enforce policies for the minimum strength of passwords, PINs, and similar authenticators
Explain PR.AA-03.201.
Enforce policies for the minimum strength of passwords, PINs, and similar authenticators
What is PR.AA-03.202? (Ex3)
Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)
Explain PR.AA-03.202.
Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)
What is PR.AA-03.203? (Ex4)
Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions
Explain PR.AA-03.203.
Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions
What is PR.AA-04?
Identity assertions are protected, conveyed, and verified
Explain the requirement of PR.AA-04.
Identity assertions are protected, conveyed, and verified
What outcome is expected by PR.AA-04?
Identity assertions are protected, conveyed, and verified
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.AA-04.204? (Ex1)
Protect identity assertions that are used to convey authentication and user information through single sign-on systems
Explain PR.AA-04.204.
Protect identity assertions that are used to convey authentication and user information through single sign-on systems
What is PR.AA-04.205? (Ex2)
Protect identity assertions that are used to convey authentication and user information between federated systems
Explain PR.AA-04.205.
Protect identity assertions that are used to convey authentication and user information between federated systems
What is PR.AA-04.206? (Ex3)
Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions
Explain PR.AA-04.206.
Implement standards-based approaches for identity assertions in all contexts, and follow all guidance for the generation (e.g., data models, metadata), protection (e.g., digital signing, encryption), and verification (e.g., signature validation) of identity assertions
What is PR.AA-05?
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
Explain the requirement of PR.AA-05.
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
What outcome is expected by PR.AA-05?
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.AA-05.207? (Ex1)
Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed
Explain PR.AA-05.207.
Review logical and physical access privileges periodically and whenever someone changes roles or leaves the organization, and promptly rescind privileges that are no longer needed
What is PR.AA-05.208? (Ex2)
Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)
Explain PR.AA-05.208.
Take attributes of the requester and the requested resource into account for authorization decisions (e.g., geolocation, day/time, requester endpoint's cyber health)
What is PR.AA-05.209? (Ex3)
Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)
Explain PR.AA-05.209.
Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)
What is PR.AA-05.210? (Ex4)
Periodically review the privileges associated with critical business functions to confirm proper separation of duties
Explain PR.AA-05.210.
Periodically review the privileges associated with critical business functions to confirm proper separation of duties
What is PR.AA-06?
Physical access to assets is managed, monitored, and enforced commensurate with risk
Explain the requirement of PR.AA-06.
Physical access to assets is managed, monitored, and enforced commensurate with risk
What outcome is expected by PR.AA-06?
Physical access to assets is managed, monitored, and enforced commensurate with risk
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk
What is PR.AA-06.211? (Ex1)
Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access
Explain PR.AA-06.211.
Use security guards, security cameras, locked entrances, alarm systems, and other physical controls to monitor facilities and restrict access
What is PR.AA-06.212? (Ex2)
Employ additional physical security controls for areas that contain high-risk assets
Explain PR.AA-06.212.
Employ additional physical security controls for areas that contain high-risk assets
What is PR.AA-06.213? (Ex3)
Escort guests, vendors, and other third parties within areas that contain business-critical assets
Explain PR.AA-06.213.
Escort guests, vendors, and other third parties within areas that contain business-critical assets
What is PR.AT? (Awareness and Training)
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
Summarize the scope of PR.AT.
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
What does PR.AT cover?
The organization's personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
What is PR.AT-01?
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
Explain the requirement of PR.AT-01.
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
What outcome is expected by PR.AT-01?
Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.AT-01.214? (Ex1)
Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources
Explain PR.AT-01.214.
Provide basic cybersecurity awareness and training to employees, contractors, partners, suppliers, and all other users of the organization's non-public resources
What is PR.AT-01.215? (Ex2)
Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)
Explain PR.AT-01.215.
Train personnel to recognize social engineering attempts and other common attacks, report attacks and suspicious activity, comply with acceptable use policies, and perform basic cyber hygiene tasks (e.g., patching software, choosing passwords, protecting credentials)
What is PR.AT-01.216? (Ex3)
Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole
Explain PR.AT-01.216.
Explain the consequences of cybersecurity policy violations, both to individual users and the organization as a whole
What is PR.AT-01.217? (Ex4)
Periodically assess or test users on their understanding of basic cybersecurity practices
Explain PR.AT-01.217.
Periodically assess or test users on their understanding of basic cybersecurity practices
What is PR.AT-01.218? (Ex5)
Require annual refreshers to reinforce existing practices and introduce new practices
Explain PR.AT-01.218.
Require annual refreshers to reinforce existing practices and introduce new practices
What is PR.AT-02?
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
Explain the requirement of PR.AT-02.
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
What outcome is expected by PR.AT-02?
Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is third? (3rd)
3rd Party Risk
Explain third.
3rd Party Risk