888.624.6737

Cyan Website Header_2000x190px

Comprehensive CMMC Glossary of Terms

As a business leader navigating CMMC, the terms and acronyms are abundant. This glossary is your go-to resource, providing clear and straightforward explanations for everything from Controlled Unclassified Information (CUI) to concepts like gap analysis and self-assessment.  Whether you're just getting started or already deep into your CMMC journey, this guide will help you confidently understand and communicate the essentials of cybersecurity compliance.

+ AC (Access Control)

The process of granting or denying specific requests to obtain and use information, IT services, and physical access to facilities.

+ APT (Advanced Persistent Threat)

A sophisticated adversary with significant resources employing multiple attack vectors over extended periods to gain unauthorized access.

+ Assessment

The evaluation of security controls against CMMC practices to ensure they are effectively implemented and achieving intended outcomes.

+ Assessment Scope

Defined boundaries of an assessment including systems, networks, processes, technologies, people, and facilities associated with CUI or FCI.

+ Asset

Anything that holds value to an organization, such as data, equipment, systems, networks, or intellectual property.

+ Boundary

Clearly-defined limits that determine the scope of a cybersecurity assessment, separating assessed systems from those not under assessment.

+ C3PAO (Certified Third-Party Assessment Organization)

An accredited entity authorized to perform formal CMMC assessments.

+ Certificate Authority (CA)

A trusted entity responsible for issuing digital certificates for secure communication and verification of identity.

+ Compliance Inheritance

A OSC that uses an ESP who has compliant systems, they “inherit” the security controls from the provider.

+ CMMC (Cybersecurity Maturity Model Certification)

A unified cybersecurity standard created by the DoD for the defense supply chain to safeguard sensitive data.

+ Certified CMMC Professional (CCP)

A person who has successfully completed all certification program requirements as outlined by the CAICO for becoming a Level 1 CMMC Assessor. A Provisional Assessor (PA) will become a CCP by passing the associated certification exam.

+ CMMC Registered Practitioner

Professionals who provide CMMC implementation consultative services. Any level of RP cannot participate on assessment teams.

+ CMMC Registered Practitioner Organization

An organization authorized to represent itself as familiar with the basic constructs of the CMMC Standard, with a CMMC-AB provided logo, to deliver non-certified CMMC Consulting Services. Signifies that the organization has agreed to the CMMC-AB Code of Professional Conduct.

+ Controlled Unclassified Information (CUI)

Sensitive information requiring safeguarding measures per federal regulations, not classified under executive orders or the Atomic Energy Act.

+ Customer Responsibility Matrix (CRM)

Formerly Shared Responsibility Matrix (SRM), a critical piece of the certification process outlining who is responsible for each cybersecurity objective in a CMMC assessment between an OSCs and ESPs.

  • Supports Certification Process: CRM is critical for the certification process as it outlines the responsibilities of both the service provider and the client, ensuring clarity and compliance.
  • Reduce Compliance Complexity: CRM lowers the risk and complexity of assessments by clearly defining the responsibilities and ensuring that all necessary controls are in place.

+ Defense Federal Acquisition Regulation Supplement (DFARS)

A DoD-specific supplement to federal acquisition regulations detailing cybersecurity compliance requirements.

+ Defense Industrial Base (DIB)

The global network of entities supplying products and services critical to U.S. defense operations.

+ Enclave (Controlled Environment)

A segmented and clearly-defined computing environment specifically implemented to protect sensitive information such as CUI, with distinct security boundaries.

+ External Service Provider (ESP)

External people, technology, or facilities that the organization utilizes, including Cloud Service Providers, Managed Service Providers, Managed Security Service Providers, and Cybersecurity-as-a-Service Providers.

+ Federal Acquisition Regulation (FAR)

The primary regulation guiding procurement for U.S. federal agencies, including cybersecurity standards for contractors.

+ Federal Contract Information

Information provided by or generated for the government under contract, not publicly available.

+ Gap Analysis

A structured evaluation identifying gaps between current cybersecurity practices and required compliance standards, resulting in actionable recommendations.

+ Incident

An occurrence compromising or potentially compromising the confidentiality, integrity, or availability of information systems or data.

+ Incident Response (IR)

Procedures established to identify, respond, mitigate, and recover from cybersecurity incidents.

+ Inheritance

The use of existing security controls or practices implemented by external service providers or parent organizations within an assessment scope.

+ Maturity Level

A defined stage within the CMMC framework indicating an organization’s capability and sophistication in cybersecurity practices.

+ Non-Federal Organization (NFO)

Any external entity (contractors, subcontractors) subject to cybersecurity requirements through contractual obligations with federal entities.

+ Organization Seeking Assessment (OSA)

The entity currently undergoing a formal cybersecurity evaluation by a C3PAO.

+ Organization Seeking Certification (OSC)

An organization actively preparing for or seeking formal CMMC certification.

+ Penetration Testing

Authorized simulated cyberattacks conducted to identify vulnerabilities and test the effectiveness of cybersecurity defenses.

+ Plan of Action and Milestones (POA&M)

A structured document outlining required actions, timelines, and resources necessary to address and remediate identified cybersecurity deficiencies.

+ Practice

Specific cybersecurity activities defined within the CMMC model that organizations must implement to achieve a desired maturity level.

+ Reciprocity

Recognition and acceptance of cybersecurity assessments or certifications from other authoritative frameworks or entities.

+ Risk Assessment (RA)

Systematic identification, analysis, evaluation, and documentation of cybersecurity risks and their potential impacts on an organization.

+ Risk Management Methodology (RMM)

Structured approach and documented methods used for managing cybersecurity risks, including identifying, prioritizing, and addressing them.

+ Security Assessment Report (SAR)

A detailed document produced by assessors summarizing findings, documenting tested security controls, and outcomes of the cybersecurity evaluation.

+ Self-Assessment

An internal review conducted by an organization to evaluate its own cybersecurity posture against CMMC practices, typically used to identify readiness gaps prior to formal assessment.

+ Supplier Performance Risk System (SPRS)

A DoD-managed system where suppliers record their cybersecurity self-assessment scores, enabling informed procurement decisions based on cybersecurity risk profiles.

+ System Integrity (SI)

The protection of information systems and data against unauthorized alterations or corruption, ensuring accuracy, consistency, and reliability.

+ System Security Plan (SSP)

A comprehensive document describing implemented and planned security measures, clearly detailing how an organization safeguards information systems and sensitive data.

+ Tactics, Techniques, and Procedures (TTP)

Methods and strategies utilized by adversaries during cyberattacks, crucial for understanding threat landscapes and developing defensive strategies.

+ Threat

Any circumstance or entity with the potential to negatively impact the confidentiality, integrity, or availability of information or systems.

+ Validation

The process of verifying that implemented cybersecurity practices effectively meet the intended security requirements or controls.

+ Vulnerability

Weaknesses or flaws within systems, procedures, or controls that adversaries could be potentially exploited.