THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.
CMMC Glossary
The following terms are used throughout the Cybersecurity Maturity Model Compliance standards:
AC | Access Control |
AES | Advanced Encryption Standard |
API | Application Programming Interface |
AT | Awareness and Training |
AU | Audit and Accountability |
C3PAO | CMMC Third-Party Assessment Organization |
CA | Security Assessment |
CD-ROM | Compact Disk Read-Only Memory |
CIO | Chief Information Officer |
CM | Configuration Management |
CMMC | Cybersecurity Maturity Model Certification |
CMVP | Cryptographic Module Validation Program |
CUI | Controlled Unclassified Information |
CVE | Common Vulnerabilities and Exposures |
CWE | Common Weakness Enumeration |
DFARS | Defense Federal Acquisition Regulation Supplement |
DHC | Device Health Check |
DIB | Defense Industrial Base |
DMZ | Demilitarized Zone |
DoD | Department of Defense |
DVD | Digital Versatile Disc or Digital Video Disc |
ESP | External Service Provider |
FAQ | Frequently Asked Question |
FAR | Federal Acquisition Regulation |
FBI | Federal Bureau of Investigation |
FCI | Federal Contract Information |
FDDI | Fiber Distributed Data Interface |
FDE | Full Disk Encryption |
FIPS | Federal Information Processing Standard |
FTP | File Transfer Protocol |
IA | Identification and Authentication |
ID | Identification |
IDS | Intrusion Detection System |
IIoT | Industrial Internet of Things |
IoT | Internet of Things |
IP | Internet Protocol |
IPSec | Internet Protocol Security |
IR | Incident Response |
ISAC | Information Sharing and Analysis Center |
ISDN | Integrated Services Digital Network |
IT | Information Technology |
LAN | Local Area Network |
MA | Maintenance |
MAC | Media Access Control |
MDM | Mobile Device Management |
MEP | Manufacturing Extension Partnership |
MFA | Multifactor Authentication |
MP | Media Protection |
NARA | National Archives and Records Administration |
NAS | Networked Attached Storage |
NIST | National Institute of Standards and Technology |
NSA | National Security Agency |
NTP | Network Time Protocol |
OS | Operating System |
OT | Operational Technology |
PDA | Personal Digital Assistant |
PE | Physical Protection |
PIV | Personal Identity Verification |
PKI | Public Key Infrastructure |
POTS | Plain Old Telephone Service |
PS | Personnel Security |
RADIUS | Remote Authentication Dial-in User Service |
RA | Risk Assessment |
SC | System and Communications Protection |
SI | System and Information Integrity |
SMS | Short Message Service |
SOC | Security Operations Center |
SP | Special Publication |
SSP | System Security Plan |
TLS | Transport Layer Security |
URL | Universal Resource Locator (aka Uniform Resource Locator) |
USB | Universal Serial Bus |
UTC | Coordinated Universal Time |
UUENCODE | Unix-to-Unix Encode |
VLAN | Virtual Local Area Network |
VoIP | Voice over Internet Protocol |
VPN | Virtual Private Network |
WPA2-PSK | WiFi Protected Access-Pre-shared Key |
Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.