Your CMMC Level 2 Partner

Tech Support exceeding expectations

(866) 340-1312

Glossary of CMMC Terms

For CMMC Level 2 Compliance

Education is the key to success

There are lots of Terms and Acronyms that are used by and associated with the US Government, DoD and CMMC Certification.

To help make things easier for you we have put together a collection of the most commonly used Terms and Acronyms used by the DoD and in CMMC eco-system.

Access Control:

Policies and mechanisms that limit access to systems, networks, and data to authorized individuals only.

Audit and Accountability:

Creating and retaining detailed records of system activity to ensure actions can be traced back to individuals

Awareness and Training:

Programs designed to educate employees on cybersecurity best practices and potential threats.

Boundary Map:

A visual representation of the scope of the CMMC assessment, identifying the systems, networks, and data that are subject to the certification requirements.

C3PAO:

Certified Third-Party Assessment Organization – An organization authorized to conduct CMMC assessments and issue certifications.

CCA:

Certified CMMC Assessor – A professional certified to conduct CMMC assessments.

CCP:

Certified CMMC Professional – A professional certified to assist organizations in preparing for CMMC assessments.

CMMC:

Cybersecurity Maturity Model Certification – A program established by the Department of Defense (DoD) to ensure that contractors have implemented adequate cybersecurity measures to protect sensitive data.

Configuration Management:

Establishing and maintaining a baseline configuration for information systems, including managing changes to those configurations.

Continuous Monitoring:

The ongoing process of monitoring an organization’s cybersecurity posture to detect and respond to threats and vulnerabilities in real-time.

CUI:

Controlled Unclassified Information – Information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies1.

DFARS:

Defense Federal Acquisition Regulation Supplement – A set of regulations that provide DoD-specific acquisition regulations that supplement the Federal Acquisition Regulation (FAR).

DIB:

Defense Industrial Base – The worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements.

FCI:

Federal Contract Information – Information provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, which is not intended for public release.

Gap Analysis:

A method of assessing the differences between the current state and desired state of an organization’s cybersecurity posture, identifying areas that need improvement to achieve compliance.

Identification and Authentication:

Ensuring users, systems, and processes are uniquely identified and their identities verified before granting access to systems and sensitive information.

Incident Response:

Developing and maintaining a clear plan with defined procedures and tools to detect, respond to, and recover from cybersecurity incidents.

Inherited Policies & Objectives:

Security controls and objectives that are inherited from a service provider, reducing the burden on the client organization to implement them independently.

Maintenance:

Regular procedures to sustain service, and repair systems to ensure optimal performance and security.

Media Protection:

Protecting and securely storing all physical and digital media containing sensitive information, including both paper and electronic formats.

Mock Assessment:

A simulated assessment conducted to prepare an organization for the actual CMMC certification process.

MSP:

Managed Service Provider – A company that remotely manages a customer’s IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

MSSP:

Managed Security Service Provider – A company that provides outsourced monitoring and management of security devices and systems.

NIST SP 800-171:

National Institute of Standards and Technology Special Publication 800-171 – A publication that provides guidelines for protecting controlled unclassified information in non-federal systems and organizations.

Personnel Security:

Measures to prevent unauthorized access and mitigate insider threats by ensuring individuals with access to critical data are trustworthy.

Physical Protection:

Managing and securing physical access to information systems, facilities, and infrastructure against unauthorized access and physical threats.

Policy Stack:

A collection of policies and procedures that an organization must implement to achieve and maintain CMMC compliance.

Remediation:

The process of addressing and correcting any deficiencies or gaps identified during a CMMC assessment to achieve compliance.

Risk Assessment:

Identifying and evaluating risks to the organization’s information systems to implement appropriate security measures.

Security Assessment:

Regular evaluations of the security posture of an organization to ensure compliance with security requirements.

Self-Attestation:

The process by which an organization certifies its own compliance with CMMC requirements, typically on an annual basis.

Shared Responsibility Matrix:

A framework that outlines the division of responsibilities between the service provider and the client for implementing and maintaining security controls.

SIEM:

Security Information and Event Management – A system that collects, analyzes, and reports on security-related data from various sources within an organization.

SOCaaS:

Security Operations Center as a Service – A cloud-based service that provides security operations center capabilities, including monitoring, detection, and response.

System and Communications Protection:

Safeguarding the integrity and confidentiality of information transmitted across networks.

System and Information Integrity:

Ensuring the accuracy and reliability of information and protect

Contact us to schedule a comprehensive CMMC readiness consultation and take the first step towards securing your DoD contracts.

Are you a C3PAO looking for a Partner to prep your Assessment Clients?

ProStratus is CMMC Level 2 Certified RP / RPO / MSP / MSSP
Pre-Assessment & Readiness Support

Download CMMC Level 2
Shared Responsibility Matrix (SRM)

CMMC Level 2
Readiness Assessment