instruction
stringlengths 14
72
| input
stringclasses 1
value | output
stringclasses 654
values |
|---|---|---|
What is PR.AT-02.219? (Ex1)
|
Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data
|
|
Explain PR.AT-02.219.
|
Identify the specialized roles within the organization that require additional cybersecurity training, such as physical and cybersecurity personnel, finance personnel, senior leadership, and anyone with access to business-critical data
|
|
What is PR.AT-02.220? (Ex2)
|
Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties
|
|
Explain PR.AT-02.220.
|
Provide role-based cybersecurity awareness and training to all those in specialized roles, including contractors, partners, suppliers, and other third parties
|
|
What is PR.AT-02.221? (Ex3)
|
Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles
|
|
Explain PR.AT-02.221.
|
Periodically assess or test users on their understanding of cybersecurity practices for their specialized roles
|
|
What is PR.AT-02.222? (Ex4)
|
Require annual refreshers to reinforce existing practices and introduce new practices
|
|
Explain PR.AT-02.222.
|
Require annual refreshers to reinforce existing practices and introduce new practices
|
|
What is PR.AT-03?
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-03.
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-03?
|
Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities
|
|
What is WR-PR.AT-03?
|
Incorporated into PR.AT-01, PR.AT-02
|
|
Explain WR-PR.AT-03.
|
Incorporated into PR.AT-01, PR.AT-02
|
|
What is PR.AT-04?
|
Senior executives understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-04.
|
Senior executives understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-04?
|
Senior executives understand their roles and responsibilities
|
|
What is WR-PR.AT-04?
|
Incorporated into PR.AT-02
|
|
Explain WR-PR.AT-04.
|
Incorporated into PR.AT-02
|
|
What is PR.AT-05?
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
Explain the requirement of PR.AT-05.
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
What outcome is expected by PR.AT-05?
|
Physical and cybersecurity personnel understand their roles and responsibilities
|
|
What is WR-PR.AT-05?
|
Incorporated into PR.AT-02
|
|
Explain WR-PR.AT-05.
|
Incorporated into PR.AT-02
|
|
What is PR.DS? (Data Security)
|
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
|
|
Summarize the scope of PR.DS.
|
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
|
|
What does PR.DS cover?
|
Data are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information
|
|
What is PR.DS-01?
|
The confidentiality, integrity, and availability of data-at-rest are protected
|
|
Explain the requirement of PR.DS-01.
|
The confidentiality, integrity, and availability of data-at-rest are protected
|
|
What outcome is expected by PR.DS-01?
|
The confidentiality, integrity, and availability of data-at-rest are protected
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.DS-01.223? (Ex1)
|
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources
|
|
Explain PR.DS-01.223.
|
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtual machine disk images, container images, and other resources
|
|
What is PR.DS-01.224? (Ex2)
|
Use full disk encryption to protect data stored on user endpoints
|
|
Explain PR.DS-01.224.
|
Use full disk encryption to protect data stored on user endpoints
|
|
What is PR.DS-01.225? (Ex3)
|
Confirm the integrity of software by validating signatures
|
|
Explain PR.DS-01.225.
|
Confirm the integrity of software by validating signatures
|
|
What is PR.DS-01.226? (Ex4)
|
Restrict the use of removable media to prevent data exfiltration
|
|
Explain PR.DS-01.226.
|
Restrict the use of removable media to prevent data exfiltration
|
|
What is PR.DS-01.227? (Ex5)
|
Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets
|
|
Explain PR.DS-01.227.
|
Physically secure removable media containing unencrypted sensitive information, such as within locked offices or file cabinets
|
|
What is PR.DS-02?
|
The confidentiality, integrity, and availability of data-in-transit are protected
|
|
Explain the requirement of PR.DS-02.
|
The confidentiality, integrity, and availability of data-in-transit are protected
|
|
What outcome is expected by PR.DS-02?
|
The confidentiality, integrity, and availability of data-in-transit are protected
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.DS-02.228? (Ex1)
|
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications
|
|
Explain PR.DS-02.228.
|
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications
|
|
What is PR.DS-02.229? (Ex2)
|
Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification
|
|
Explain PR.DS-02.229.
|
Automatically encrypt or block outbound emails and other communications that contain sensitive data, depending on the data classification
|
|
What is PR.DS-02.230? (Ex3)
|
Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks
|
|
Explain PR.DS-02.230.
|
Block access to personal email, file sharing, file storage services, and other personal communications applications and services from organizational systems and networks
|
|
What is PR.DS-02.231? (Ex4)
|
Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments
|
|
Explain PR.DS-02.231.
|
Prevent reuse of sensitive data from production environments (e.g., customer records) in development, testing, and other non-production environments
|
|
What is PR.DS-03?
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
Explain the requirement of PR.DS-03.
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
What outcome is expected by PR.DS-03?
|
Assets are formally managed throughout removal, transfers, and disposition
|
|
What is WR-PR.DS-03?
|
Incorporated into ID.AM-08, PR.PS-03
|
|
Explain WR-PR.DS-03.
|
Incorporated into ID.AM-08, PR.PS-03
|
|
What is PR.DS-04?
|
Adequate capacity to ensure availability is maintained
|
|
Explain the requirement of PR.DS-04.
|
Adequate capacity to ensure availability is maintained
|
|
What outcome is expected by PR.DS-04?
|
Adequate capacity to ensure availability is maintained
|
|
What is WR-PR.DS-04?
|
Moved to PR.IR-04
|
|
Explain WR-PR.DS-04.
|
Moved to PR.IR-04
|
|
What is PR.DS-05?
|
Protections against data leaks are implemented
|
|
Explain the requirement of PR.DS-05.
|
Protections against data leaks are implemented
|
|
What outcome is expected by PR.DS-05?
|
Protections against data leaks are implemented
|
|
What is WR-PR.DS-05?
|
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
|
|
Explain WR-PR.DS-05.
|
Incorporated into PR.DS-01, PR.DS-02, PR.DS-10
|
|
What is PR.DS-06?
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
Explain the requirement of PR.DS-06.
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
What outcome is expected by PR.DS-06?
|
Integrity checking mechanisms are used to verify software, firmware, and information integrity
|
|
What is WR-PR.DS-06?
|
Incorporated into PR.DS-01, DE.CM-09
|
|
Explain WR-PR.DS-06.
|
Incorporated into PR.DS-01, DE.CM-09
|
|
What is PR.DS-07?
|
The development and testing environment(s) are separate from the production environment
|
|
Explain the requirement of PR.DS-07.
|
The development and testing environment(s) are separate from the production environment
|
|
What outcome is expected by PR.DS-07?
|
The development and testing environment(s) are separate from the production environment
|
|
What is WR-PR.DS-07?
|
Incorporated into PR.IR-01
|
|
Explain WR-PR.DS-07.
|
Incorporated into PR.IR-01
|
|
What is PR.DS-08?
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
Explain the requirement of PR.DS-08.
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
What outcome is expected by PR.DS-08?
|
Integrity checking mechanisms are used to verify hardware integrity
|
|
What is WR-PR.DS-08?
|
Incorporated into ID.RA-09, DE.CM-09
|
|
Explain WR-PR.DS-08.
|
Incorporated into ID.RA-09, DE.CM-09
|
|
What is PR.DS-10?
|
The confidentiality, integrity, and availability of data-in-use are protected
|
|
Explain the requirement of PR.DS-10.
|
The confidentiality, integrity, and availability of data-in-use are protected
|
|
What outcome is expected by PR.DS-10?
|
The confidentiality, integrity, and availability of data-in-use are protected
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.DS-10.232? (Ex1)
|
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
|
|
Explain PR.DS-10.232.
|
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
|
|
What is PR.DS-10.233? (Ex2)
|
Protect data in use from access by other users and processes of the same platform
|
|
Explain PR.DS-10.233.
|
Protect data in use from access by other users and processes of the same platform
|
|
What is PR.DS-11?
|
Backups of data are created, protected, maintained, and tested
|
|
Explain the requirement of PR.DS-11.
|
Backups of data are created, protected, maintained, and tested
|
|
What outcome is expected by PR.DS-11?
|
Backups of data are created, protected, maintained, and tested
|
|
What is first? (1st)
|
1st Party Risk
|
|
Explain first.
|
1st Party Risk
|
|
What is PR.DS-11.234? (Ex1)
|
Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules
|
|
Explain PR.DS-11.234.
|
Continuously back up critical data in near-real-time, and back up other data frequently at agreed-upon schedules
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.