Source of Reference: The official CMMC Glossary from the Office of the Under Secretary of Defense Acquisition & Sustainment.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
A
B
C
D
E
F
G
H
I
L
M
| MA |
Maintenance
|
| MAC |
Media Access Control
|
| MC |
Maturity Capability
|
| MC## |
Maturity Capability Number
|
| MDM |
Mobile Device Management
|
| MEP |
Manufacturing Extension Partnership
|
| MFA |
Multifactor Authentication
|
| ML |
Maturity Level
|
| ML# |
Maturity Level Number
|
| MMC |
Multimedia Card
|
| MP |
Media Protection
|
| N/A |
Not Applicable (NA)
|
| NARA |
National Archives and Records Administration
|
| NAS |
Networked Attached Storage
|
| NAS |
National Aerospace Standard
|
| NCSC |
National Cyber Security Centre
|
| NIST |
National Institute of Standards and Technology
|
| NISTIR |
NIST Interagency (or Internal) Report
|
| NPE |
Non-Person Entity
|
| NSA |
National Security Agency
|
| NSA/CSS |
NSA Central Security Service
|
| NSPD |
National Security Presidential Directive
|
| NSTISSD |
National Security Telecommunications and Information Systems Security Directive
|
| NTP |
Network Time Protocol
|
| NYSSCPA |
New York State Society of CPAs
|
O
| OMB |
Office of Management and Budget
|
| OS |
Operating System
|
| OSC |
Organization Seeking Certification
|
| OT |
Operational Technology
|
| OUSD A&S |
Office of the Under Secretary of Defense for Acquisition and Sustainment
|
P
| PCI |
Personal Identity Verification Card Issuers
|
| PDA |
Personal Digital Assistant
|
| PE |
Physical Protection
|
| PGP |
Pretty Good Privacy
|
| PII |
Personally Identifiable Information
|
| PIV |
Personal Identify Verification
|
| PKI |
Public Key Infrastructure
|
| PLC |
Programmable Logic Controller
|
| POC |
Point of Contact
|
| POTS |
Plain Old Telephone Service
|
| PP |
Physical Protection
|
| PPD |
Presidential Policy Directive
|
| PS |
Personnel Security
|
| PUB |
Publication
|
R
| RADIUS |
Remote Authentication Dial-in User Service
|
| RE |
Recovery
|
| Rev |
Revision
|
| RF |
Radio Frequency
|
| RFC |
Request for Comments
|
| RM |
Risk Management
|
| RMM |
Resilience Management Model
|
| RMM |
Risk Management Model
|
| RPO |
Recovery Point Objectives
|
| RTO |
Recovery Time Objectives
|
S
| SA |
Situational Awareness
|
| SaaS |
Software as a Service
|
| SAS |
Security Assessment
|
| SC |
System and Communications Protection
|
| SCADA |
Supervisory Control and Data Acquisition
|
| SCRM |
Supply Chain Risk Management
|
| SHA |
Security Hash Algorithm
|
| SI |
System and Information Integrity
|
| SIEM |
Security Integration and Event Management
|
| SMS |
Short Message Service
|
| SOC |
Security Operations Center
|
| SP |
Special Publication
|
| SPF |
Sender Policy Framework
|
| SSC |
Secure Socket Layer
|
| SSD |
Solid-State Disk
|
| SSP |
System Security Plan
|
| SSP |
Sector Specific Plan
|
T
| TLS |
Transport Layer Security
|
| TTP |
Tactics, Techniques, and Procedures
|
U
| U.S. |
United States
|
| UARC |
University Affiliated Research Center
|
| UK |
United Kingdom
|
| UMD |
Universal Media Disc
|
| URL |
Uniform Resource Locator
|
| USB |
Universal Serial Bus
|
| UTC |
Coordinated Universal Time
|
| UUENCODE |
Unix-to-Unix Encode
|
V
| VLAN |
Virtual Local Area Network
|
| VoIP |
Voice over Internet Protocol
|
| Vol. |
Volume
|
| VPN |
Virtual Private Network
|
W
| WAP |
Wireless Access Point
|
| WPA2-PSK |
WiFi Protected Access-Pre-shared Key
|
X
| xD |
Extreme Digital (flash memory card device)
|