THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.
CMMC Glossary
The following terms are used throughout the Cybersecurity Maturity Model Compliance standards:
| AC | Access Control |
| AES | Advanced Encryption Standard |
| API | Application Programming Interface |
| AT | Awareness and Training |
| AU | Audit and Accountability |
| C3PAO | CMMC Third-Party Assessment Organization |
| CA | Security Assessment |
| CD-ROM | Compact Disk Read-Only Memory |
| CIO | Chief Information Officer |
| CM | Configuration Management |
| CMMC | Cybersecurity Maturity Model Certification |
| CMVP | Cryptographic Module Validation Program |
| CUI | Controlled Unclassified Information |
| CVE | Common Vulnerabilities and Exposures |
| CWE | Common Weakness Enumeration |
| DFARS | Defense Federal Acquisition Regulation Supplement |
| DHC | Device Health Check |
| DIB | Defense Industrial Base |
| DMZ | Demilitarized Zone |
| DoD | Department of Defense |
| DVD | Digital Versatile Disc or Digital Video Disc |
| ESP | External Service Provider |
| FAQ | Frequently Asked Question |
| FAR | Federal Acquisition Regulation |
| FBI | Federal Bureau of Investigation |
| FCI | Federal Contract Information |
| FDDI | Fiber Distributed Data Interface |
| FDE | Full Disk Encryption |
| FIPS | Federal Information Processing Standard |
| FTP | File Transfer Protocol |
| IA | Identification and Authentication |
| ID | Identification |
| IDS | Intrusion Detection System |
| IIoT | Industrial Internet of Things |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPSec | Internet Protocol Security |
| IR | Incident Response |
| ISAC | Information Sharing and Analysis Center |
| ISDN | Integrated Services Digital Network |
| IT | Information Technology |
| LAN | Local Area Network |
| MA | Maintenance |
| MAC | Media Access Control |
| MDM | Mobile Device Management |
| MEP | Manufacturing Extension Partnership |
| MFA | Multifactor Authentication |
| MP | Media Protection |
| NARA | National Archives and Records Administration |
| NAS | Networked Attached Storage |
| NIST | National Institute of Standards and Technology |
| NSA | National Security Agency |
| NTP | Network Time Protocol |
| OS | Operating System |
| OT | Operational Technology |
| PDA | Personal Digital Assistant |
| PE | Physical Protection |
| PIV | Personal Identity Verification |
| PKI | Public Key Infrastructure |
| POTS | Plain Old Telephone Service |
| PS | Personnel Security |
| RADIUS | Remote Authentication Dial-in User Service |
| RA | Risk Assessment |
| SC | System and Communications Protection |
| SI | System and Information Integrity |
| SMS | Short Message Service |
| SOC | Security Operations Center |
| SP | Special Publication |
| SSP | System Security Plan |
| TLS | Transport Layer Security |
| URL | Universal Resource Locator (aka Uniform Resource Locator) |
| USB | Universal Serial Bus |
| UTC | Coordinated Universal Time |
| UUENCODE | Unix-to-Unix Encode |
| VLAN | Virtual Local Area Network |
| VoIP | Voice over Internet Protocol |
| VPN | Virtual Private Network |
| WPA2-PSK | WiFi Protected Access-Pre-shared Key |
Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.