Comprehensive CMMC Glossary of Terms
As a business leader navigating CMMC, the terms and acronyms are abundant. This glossary is your go-to resource, providing clear and straightforward explanations for everything from Controlled Unclassified Information (CUI) to concepts like gap analysis and self-assessment. Whether you're just getting started or already deep into your CMMC journey, this guide will help you confidently understand and communicate the essentials of cybersecurity compliance.
+ AC (Access Control)
The process of granting or denying specific requests to obtain and use information, IT services, and physical access to facilities.
+ APT (Advanced Persistent Threat)
A sophisticated adversary with significant resources employing multiple attack vectors over extended periods to gain unauthorized access.
+ Assessment
The evaluation of security controls against CMMC practices to ensure they are effectively implemented and achieving intended outcomes.
+ Assessment Scope
Defined boundaries of an assessment including systems, networks, processes, technologies, people, and facilities associated with CUI or FCI.
+ Asset
Anything that holds value to an organization, such as data, equipment, systems, networks, or intellectual property.
+ Boundary
Clearly-defined limits that determine the scope of a cybersecurity assessment, separating assessed systems from those not under assessment.
+ C3PAO (Certified Third-Party Assessment Organization)
An accredited entity authorized to perform formal CMMC assessments.
+ Certificate Authority (CA)
A trusted entity responsible for issuing digital certificates for secure communication and verification of identity.
+ Compliance Inheritance
A OSC that uses an ESP who has compliant systems, they “inherit” the security controls from the provider.
+ CMMC (Cybersecurity Maturity Model Certification)
A unified cybersecurity standard created by the DoD for the defense supply chain to safeguard sensitive data.
+ Certified CMMC Professional (CCP)
A person who has successfully completed all certification program requirements as outlined by the CAICO for becoming a Level 1 CMMC Assessor. A Provisional Assessor (PA) will become a CCP by passing the associated certification exam.
+ CMMC Registered Practitioner
Professionals who provide CMMC implementation consultative services. Any level of RP cannot participate on assessment teams.
+ CMMC Registered Practitioner Organization
An organization authorized to represent itself as familiar with the basic constructs of the CMMC Standard, with a CMMC-AB provided logo, to deliver non-certified CMMC Consulting Services. Signifies that the organization has agreed to the CMMC-AB Code of Professional Conduct.
+ Controlled Unclassified Information (CUI)
Sensitive information requiring safeguarding measures per federal regulations, not classified under executive orders or the Atomic Energy Act.
+ Customer Responsibility Matrix (CRM)
Formerly Shared Responsibility Matrix (SRM), a critical piece of the certification process outlining who is responsible for each cybersecurity objective in a CMMC assessment between an OSCs and ESPs.
- Supports Certification Process: CRM is critical for the certification process as it outlines the responsibilities of both the service provider and the client, ensuring clarity and compliance.
- Reduce Compliance Complexity: CRM lowers the risk and complexity of assessments by clearly defining the responsibilities and ensuring that all necessary controls are in place.
+ Defense Federal Acquisition Regulation Supplement (DFARS)
A DoD-specific supplement to federal acquisition regulations detailing cybersecurity compliance requirements.
+ Defense Industrial Base (DIB)
The global network of entities supplying products and services critical to U.S. defense operations.
+ Enclave (Controlled Environment)
A segmented and clearly-defined computing environment specifically implemented to protect sensitive information such as CUI, with distinct security boundaries.
+ External Service Provider (ESP)
External people, technology, or facilities that the organization utilizes, including Cloud Service Providers, Managed Service Providers, Managed Security Service Providers, and Cybersecurity-as-a-Service Providers.
+ Federal Acquisition Regulation (FAR)
The primary regulation guiding procurement for U.S. federal agencies, including cybersecurity standards for contractors.
+ Federal Contract Information
Information provided by or generated for the government under contract, not publicly available.
+ Gap Analysis
A structured evaluation identifying gaps between current cybersecurity practices and required compliance standards, resulting in actionable recommendations.
+ Incident
An occurrence compromising or potentially compromising the confidentiality, integrity, or availability of information systems or data.
+ Incident Response (IR)
Procedures established to identify, respond, mitigate, and recover from cybersecurity incidents.
+ Inheritance
The use of existing security controls or practices implemented by external service providers or parent organizations within an assessment scope.
+ Maturity Level
A defined stage within the CMMC framework indicating an organization’s capability and sophistication in cybersecurity practices.
+ Non-Federal Organization (NFO)
Any external entity (contractors, subcontractors) subject to cybersecurity requirements through contractual obligations with federal entities.
+ Organization Seeking Assessment (OSA)
The entity currently undergoing a formal cybersecurity evaluation by a C3PAO.
+ Organization Seeking Certification (OSC)
An organization actively preparing for or seeking formal CMMC certification.
+ Penetration Testing
Authorized simulated cyberattacks conducted to identify vulnerabilities and test the effectiveness of cybersecurity defenses.
+ Plan of Action and Milestones (POA&M)
A structured document outlining required actions, timelines, and resources necessary to address and remediate identified cybersecurity deficiencies.
+ Practice
Specific cybersecurity activities defined within the CMMC model that organizations must implement to achieve a desired maturity level.
+ Reciprocity
Recognition and acceptance of cybersecurity assessments or certifications from other authoritative frameworks or entities.
+ Risk Assessment (RA)
Systematic identification, analysis, evaluation, and documentation of cybersecurity risks and their potential impacts on an organization.
+ Risk Management Methodology (RMM)
Structured approach and documented methods used for managing cybersecurity risks, including identifying, prioritizing, and addressing them.
+ Security Assessment Report (SAR)
A detailed document produced by assessors summarizing findings, documenting tested security controls, and outcomes of the cybersecurity evaluation.
+ Self-Assessment
An internal review conducted by an organization to evaluate its own cybersecurity posture against CMMC practices, typically used to identify readiness gaps prior to formal assessment.
+ Supplier Performance Risk System (SPRS)
A DoD-managed system where suppliers record their cybersecurity self-assessment scores, enabling informed procurement decisions based on cybersecurity risk profiles.
+ System Integrity (SI)
The protection of information systems and data against unauthorized alterations or corruption, ensuring accuracy, consistency, and reliability.
+ System Security Plan (SSP)
A comprehensive document describing implemented and planned security measures, clearly detailing how an organization safeguards information systems and sensitive data.
+ Tactics, Techniques, and Procedures (TTP)
Methods and strategies utilized by adversaries during cyberattacks, crucial for understanding threat landscapes and developing defensive strategies.
+ Threat
Any circumstance or entity with the potential to negatively impact the confidentiality, integrity, or availability of information or systems.
+ Validation
The process of verifying that implemented cybersecurity practices effectively meet the intended security requirements or controls.
+ Vulnerability
Weaknesses or flaws within systems, procedures, or controls that adversaries could be potentially exploited.