Source of Reference: The official CMMC Glossary from the Office of the Under Secretary of Defense Acquisition & Sustainment.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
A
B
C
D
E
F
G
H
I
L
M
MA |
Maintenance
|
MAC |
Media Access Control
|
MC |
Maturity Capability
|
MC## |
Maturity Capability Number
|
MDM |
Mobile Device Management
|
MEP |
Manufacturing Extension Partnership
|
MFA |
Multifactor Authentication
|
ML |
Maturity Level
|
ML# |
Maturity Level Number
|
MMC |
Multimedia Card
|
MP |
Media Protection
|
N/A |
Not Applicable (NA)
|
NARA |
National Archives and Records Administration
|
NAS |
Networked Attached Storage
|
NAS |
National Aerospace Standard
|
NCSC |
National Cyber Security Centre
|
NIST |
National Institute of Standards and Technology
|
NISTIR |
NIST Interagency (or Internal) Report
|
NPE |
Non-Person Entity
|
NSA |
National Security Agency
|
NSA/CSS |
NSA Central Security Service
|
NSPD |
National Security Presidential Directive
|
NSTISSD |
National Security Telecommunications and Information Systems Security Directive
|
NTP |
Network Time Protocol
|
NYSSCPA |
New York State Society of CPAs
|
O
OMB |
Office of Management and Budget
|
OS |
Operating System
|
OSC |
Organization Seeking Certification
|
OT |
Operational Technology
|
OUSD A&S |
Office of the Under Secretary of Defense for Acquisition and Sustainment
|
P
PCI |
Personal Identity Verification Card Issuers
|
PDA |
Personal Digital Assistant
|
PE |
Physical Protection
|
PGP |
Pretty Good Privacy
|
PII |
Personally Identifiable Information
|
PIV |
Personal Identify Verification
|
PKI |
Public Key Infrastructure
|
PLC |
Programmable Logic Controller
|
POC |
Point of Contact
|
POTS |
Plain Old Telephone Service
|
PP |
Physical Protection
|
PPD |
Presidential Policy Directive
|
PS |
Personnel Security
|
PUB |
Publication
|
R
RADIUS |
Remote Authentication Dial-in User Service
|
RE |
Recovery
|
Rev |
Revision
|
RF |
Radio Frequency
|
RFC |
Request for Comments
|
RM |
Risk Management
|
RMM |
Resilience Management Model
|
RMM |
Risk Management Model
|
RPO |
Recovery Point Objectives
|
RTO |
Recovery Time Objectives
|
S
SA |
Situational Awareness
|
SaaS |
Software as a Service
|
SAS |
Security Assessment
|
SC |
System and Communications Protection
|
SCADA |
Supervisory Control and Data Acquisition
|
SCRM |
Supply Chain Risk Management
|
SHA |
Security Hash Algorithm
|
SI |
System and Information Integrity
|
SIEM |
Security Integration and Event Management
|
SMS |
Short Message Service
|
SOC |
Security Operations Center
|
SP |
Special Publication
|
SPF |
Sender Policy Framework
|
SSC |
Secure Socket Layer
|
SSD |
Solid-State Disk
|
SSP |
System Security Plan
|
SSP |
Sector Specific Plan
|
T
TLS |
Transport Layer Security
|
TTP |
Tactics, Techniques, and Procedures
|
U
U.S. |
United States
|
UARC |
University Affiliated Research Center
|
UK |
United Kingdom
|
UMD |
Universal Media Disc
|
URL |
Uniform Resource Locator
|
USB |
Universal Serial Bus
|
UTC |
Coordinated Universal Time
|
UUENCODE |
Unix-to-Unix Encode
|
V
VLAN |
Virtual Local Area Network
|
VoIP |
Voice over Internet Protocol
|
Vol. |
Volume
|
VPN |
Virtual Private Network
|
W
WAP |
Wireless Access Point
|
WPA2-PSK |
WiFi Protected Access-Pre-shared Key
|
X
xD |
Extreme Digital (flash memory card device)
|