instruction
stringlengths
14
72
input
stringclasses
1 value
output
stringclasses
654 values
What is PR.AT-02.219? (Ex1)
Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data
Explain PR.AT-02.219.
Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data
What is PR.AT-02.220? (Ex2)
Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties
Explain PR.AT-02.220.
Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties
What is PR.AT-02.221? (Ex3)
Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles
Explain PR.AT-02.221.
Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles
What is PR.AT-02.222? (Ex4)
Require annual refreshers to reinforce existing practices and introduce new practices
Explain PR.AT-02.222.
Require annual refreshers to reinforce existing practices and introduce new practices
What is PR.AT-03?
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
Explain the requirement of PR.AT-03.
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
What outcome is expected by PR.AT-03?
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
What is WR-PR.AT-03?
Incorporated into PR.AT-01, PR.AT-02
Explain WR-PR.AT-03.
Incorporated into PR.AT-01, PR.AT-02
What is PR.AT-04?
Senior executives understand their roles and responsibilities
Explain the requirement of PR.AT-04.
Senior executives understand their roles and responsibilities
What outcome is expected by PR.AT-04?
Senior executives understand their roles and responsibilities
What is WR-PR.AT-04?
Incorporated into PR.AT-02
Explain WR-PR.AT-04.
Incorporated into PR.AT-02
What is PR.AT-05?
Physical and cybersecurity personnel understand their roles and responsibilities
Explain the requirement of PR.AT-05.
Physical and cybersecurity personnel understand their roles and responsibilities
What outcome is expected by PR.AT-05?
Physical and cybersecurity personnel understand their roles and responsibilities
What is WR-PR.AT-05?
Incorporated into PR.AT-02
Explain WR-PR.AT-05.
Incorporated into PR.AT-02
What is PR.DS? (Data Security)
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
Summarize the scope of PR.DS.
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
What does PR.DS cover?
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
What is PR.DS-01?
The confidentiality, integrity, and availability of data-at-rest are protected
Explain the requirement of PR.DS-01.
The confidentiality, integrity, and availability of data-at-rest are protected
What outcome is expected by PR.DS-01?
The confidentiality, integrity, and availability of data-at-rest are protected
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.DS-01.223? (Ex1)
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources
Explain PR.DS-01.223.
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources
What is PR.DS-01.224? (Ex2)
Use full disk encryption to protect data stored on user endpoints
Explain PR.DS-01.224.
Use full disk encryption to protect data stored on user endpoints
What is PR.DS-01.225? (Ex3)
Confirm the integrity of software by validating signatures
Explain PR.DS-01.225.
Confirm the integrity of software by validating signatures
What is PR.DS-01.226? (Ex4)
Restrict the use of removable media to prevent data exfiltration
Explain PR.DS-01.226.
Restrict the use of removable media to prevent data exfiltration
What is PR.DS-01.227? (Ex5)
Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets
Explain PR.DS-01.227.
Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets
What is PR.DS-02?
The confidentiality, integrity, and availability of data-in-transit are protected
Explain the requirement of PR.DS-02.
The confidentiality, integrity, and availability of data-in-transit are protected
What outcome is expected by PR.DS-02?
The confidentiality, integrity, and availability of data-in-transit are protected
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.DS-02.228? (Ex1)
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications
Explain PR.DS-02.228.
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications
What is PR.DS-02.229? (Ex2)
Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification
Explain PR.DS-02.229.
Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification
What is PR.DS-02.230? (Ex3)
Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks
Explain PR.DS-02.230.
Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks
What is PR.DS-02.231? (Ex4)
Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments
Explain PR.DS-02.231.
Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments
What is PR.DS-03?
Assets are formally managed throughout removal, transfers, and disposition
Explain the requirement of PR.DS-03.
Assets are formally managed throughout removal, transfers, and disposition
What outcome is expected by PR.DS-03?
Assets are formally managed throughout removal, transfers, and disposition
What is WR-PR.DS-03?
Incorporated into ID.AM-08, PR.PS-03
Explain WR-PR.DS-03.
Incorporated into ID.AM-08, PR.PS-03
What is PR.DS-04?
Adequate capacity to ensure availability is maintained
Explain the requirement of PR.DS-04.
Adequate capacity to ensure availability is maintained
What outcome is expected by PR.DS-04?
Adequate capacity to ensure availability is maintained
What is WR-PR.DS-04?
Moved to PR.IR-04
Explain WR-PR.DS-04.
Moved to PR.IR-04
What is PR.DS-05?
Protections against data leaks are implemented
Explain the requirement of PR.DS-05.
Protections against data leaks are implemented
What outcome is expected by PR.DS-05?
Protections against data leaks are implemented
What is WR-PR.DS-05?
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
Explain WR-PR.DS-05.
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
What is PR.DS-06?
Integrity checking mechanisms are used to verify software, firmware, and information integrity
Explain the requirement of PR.DS-06.
Integrity checking mechanisms are used to verify software, firmware, and information integrity
What outcome is expected by PR.DS-06?
Integrity checking mechanisms are used to verify software, firmware, and information integrity
What is WR-PR.DS-06?
Incorporated into PR.DS-01, DE.CM-09
Explain WR-PR.DS-06.
Incorporated into PR.DS-01, DE.CM-09
What is PR.DS-07?
The development and testing environment(s) are separate from the production environment
Explain the requirement of PR.DS-07.
The development and testing environment(s) are separate from the production environment
What outcome is expected by PR.DS-07?
The development and testing environment(s) are separate from the production environment
What is WR-PR.DS-07?
Incorporated into PR.IR-01
Explain WR-PR.DS-07.
Incorporated into PR.IR-01
What is PR.DS-08?
Integrity checking mechanisms are used to verify hardware integrity
Explain the requirement of PR.DS-08.
Integrity checking mechanisms are used to verify hardware integrity
What outcome is expected by PR.DS-08?
Integrity checking mechanisms are used to verify hardware integrity
What is WR-PR.DS-08?
Incorporated into ID.RA-09, DE.CM-09
Explain WR-PR.DS-08.
Incorporated into ID.RA-09, DE.CM-09
What is PR.DS-10?
The confidentiality, integrity, and availability of data-in-use are protected
Explain the requirement of PR.DS-10.
The confidentiality, integrity, and availability of data-in-use are protected
What outcome is expected by PR.DS-10?
The confidentiality, integrity, and availability of data-in-use are protected
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.DS-10.232? (Ex1)
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
Explain PR.DS-10.232.
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
What is PR.DS-10.233? (Ex2)
Protect data in use from access by other users and processes of the same platform
Explain PR.DS-10.233.
Protect data in use from access by other users and processes of the same platform
What is PR.DS-11?
Backups of data are created, protected, maintained, and tested
Explain the requirement of PR.DS-11.
Backups of data are created, protected, maintained, and tested
What outcome is expected by PR.DS-11?
Backups of data are created, protected, maintained, and tested
What is first? (1st)
1st Party Risk
Explain first.
1st Party Risk
What is PR.DS-11.234? (Ex1)
Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules
Explain PR.DS-11.234.
Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules