The cyber and IT communities have a serious acronym problem. This page is the running index of the terms used across the rest of the site, grouped by domain. Where a term is documented in depth elsewhere, the entry is intentionally short — the goal is to get you oriented, not to replicate the source.
NIST 800-53 Control Families
- AC
- Access Control. Who is allowed to do what, on which system, under what conditions.
- AT
- Awareness and Training. Workforce security education and role-specific training requirements.
- AU
- Audit and Accountability. Logging, log review, and the ability to attribute actions to actors.
- CA
- Assessment, Authorization, and Monitoring. The mechanics of getting and keeping an ATO.
- CM
- Configuration Management. Baselines, change control, and preventing configuration drift.
- CP
- Contingency Planning. Backup, recovery, and continuity of operations.
- IA
- Identification and Authentication. Proving who or what is making a request.
- IR
- Incident Response. Detection, containment, eradication, recovery, and lessons learned.
- MA
- Maintenance. Controlled hardware and software maintenance, including remote and third-party.
- MP
- Media Protection. Handling, storage, transport, and sanitization of physical and digital media.
- PE
- Physical and Environmental Protection. Doors, locks, HVAC, fire suppression, power.
- PL
- Planning. System security and privacy plans, rules of behavior.
- PM
- Program Management. Enterprise-level governance controls, distinct from system-level controls.
- PS
- Personnel Security. Screening, position-risk designation, transfer, and termination procedures.
- PT
- PII Processing and Transparency. Privacy controls introduced in NIST 800-53 Rev 5.
- RA
- Risk Assessment. Identifying and analyzing risk to operations, assets, and individuals.
- SA
- System and Services Acquisition. Building security into procurement and the SDLC.
- SC
- System and Communications Protection. Boundary protection, cryptographic protection, isolation.
- SI
- System and Information Integrity. Flaw remediation, malicious-code protection, monitoring.
- SR
- Supply Chain Risk Management. Third-party and supply-chain risk introduced in Rev 5.
Risk, Compliance, and Authorization
- RMF
- Risk Management Framework. NIST SP 800-37 Rev 2. The seven-step process by which federal systems achieve and maintain authorization.
- FISMA
- Federal Information Security Modernization Act. The 2014 update that gave OMB and DHS expanded oversight and made RMF the de facto standard.
- FedRAMP
- Federal Risk and Authorization Management Program. RMF as applied to cloud service offerings.
- ATO
- Authority to Operate. The signed risk-acceptance decision from an Authorizing Official permitting a system to run in production.
- POA&M
- Plan of Action and Milestones. The living document tracking unresolved findings, owners, and target completion dates.
- SSP
- System Security Plan. The system’s “blueprint” for control implementation. The single most-referenced document in any RMF package.
- SAR
- Security Assessment Report. The assessor’s evidence-backed verdict on each control.
- SAP
- Security Assessment Plan. The pre-assessment document that defines scope, methods, and acceptance criteria.
- AO
- Authorizing Official. The senior executive accountable for the residual risk of operating the system.
- ISSO
- Information System Security Officer. Day-to-day owner of the system’s security posture.
- ISSE
- Information System Security Engineer. Engineering counterpart to the ISSO; designs the controls into the architecture.
- CCB
- Configuration Control Board. The body that approves or rejects changes to the authorized baseline.
- BIA
- Business Impact Analysis. Quantifies the consequences of a system being unavailable or compromised; feeds CP and categorization.
- CONOPS
- Concept of Operations. Plain-language description of how a system is actually used.
Cybersecurity Operations
- SOC
- Security Operations Center. The team and tooling that monitors, triages, and responds.
- SIEM
- Security Information and Event Management. Centralized log collection, correlation, and alerting.
- SOAR
- Security Orchestration, Automation, and Response. The “hands and feet” layer that automates SOC playbooks.
- EDR / MDR / XDR
- Endpoint / Managed / Extended Detection and Response. A spectrum of tooling, from agent-on-host (EDR) to outsourced 24×7 (MDR) to multi-telemetry (XDR).
- IDS / IPS
- Intrusion Detection / Prevention System. Network sensors that alert on (IDS) or block (IPS) suspicious traffic.
- DLP
- Data Loss Prevention. Controls that detect and stop sensitive data from leaving an environment.
- CASB
- Cloud Access Security Broker. A policy-enforcement point between users and cloud services.
- WAF
- Web Application Firewall. L7 filter for HTTP-based attacks against web apps and APIs.
- ZTA / ZTNA
- Zero Trust Architecture / Network Access. “Never trust, always verify” — identity-aware, per-request access decisions instead of perimeter trust.
- ATT&CK
- MITRE Adversarial Tactics, Techniques, and Common Knowledge. A globally accessible knowledge base of adversary behavior.
- ATLAS
- MITRE Adversarial Threat Landscape for AI Systems. ATT&CK’s sibling knowledge base for ML/AI-system attacks.
- CKC
- Cyber Kill Chain. Lockheed Martin’s seven-stage model of an intrusion. Older than ATT&CK but still useful for executive framing.
- CTI
- Cyber Threat Intelligence. Curated information about adversaries, intent, capability, and infrastructure.
- IoC
- Indicator of Compromise. A specific artifact (hash, IP, domain) that suggests a compromise has occurred.
- TTP
- Tactics, Techniques, and Procedures. Adversary behavior at three increasing levels of specificity. The ATT&CK “T” levels.
- DFIR
- Digital Forensics and Incident Response. The combined discipline of investigating and recovering from incidents.
Vulnerabilities and Exposure
- CVE
- Common Vulnerabilities and Exposures. Globally unique identifiers for publicly known software vulnerabilities.
- CVSS
- Common Vulnerability Scoring System. Numeric severity score (0.0–10.0) attached to a CVE. Useful, but not a substitute for context.
- CWE
- Common Weakness Enumeration. Categories of underlying weaknesses (e.g., CWE-79 = XSS).
- NVD
- National Vulnerability Database. NIST’s enriched feed of CVEs with CVSS scores and CPE mappings.
- SBOM
- Software Bill of Materials. Machine-readable inventory of software components. Required for federal acquisition under EO 14028.
- VEX
- Vulnerability Exploitability eXchange. Companion to SBOM that states whether a CVE is actually exploitable in a given product.
- RCE / LPE
- Remote Code Execution / Local Privilege Escalation. Two of the most dangerous outcomes a vulnerability can enable.
- XSS / CSRF / SSRF / SQLi
- Web-app vulnerability classes: cross-site scripting, cross-site request forgery, server-side request forgery, SQL injection.
Identity and Access
- IAM
- Identity and Access Management. The umbrella discipline.
- IGA
- Identity Governance and Administration. The lifecycle layer: joiner-mover-leaver, access reviews, segregation-of-duties.
- PAM
- Privileged Access Management. Vaulting, session recording, and just-in-time elevation for high-privilege accounts.
- MFA
- Multi-Factor Authentication. Two or more of: something you know, have, or are.
- SSO
- Single Sign-On. One authentication event grants access to multiple downstream services.
- SAML / OIDC / OAuth
- The three protocols that carry most enterprise SSO and authorization. SAML is XML-based and older; OIDC sits on top of OAuth 2.0 for authentication.
- RBAC / ABAC
- Role-Based / Attribute-Based Access Control. RBAC groups permissions by role; ABAC evaluates richer attribute policies at request time.
- PoLP
- Principle of Least Privilege. Grant the minimum access required for the task. Easier to recite than to implement.
Cryptography
- AES / RSA / ECC
- Advanced Encryption Standard / Rivest-Shamir-Adleman / Elliptic Curve Cryptography. AES for symmetric, RSA and ECC for asymmetric.
- TLS / mTLS
- Transport Layer Security. mTLS adds mutual authentication — both sides present certificates.
- HSM
- Hardware Security Module. Tamper-resistant device for key generation, storage, and signing.
- KMS
- Key Management Service. Cloud-provider-managed key custody (e.g., AWS KMS, Azure Key Vault).
- PKI
- Public Key Infrastructure. The certificate authorities, intermediates, CRLs, and OCSP responders that make TLS trust work.
- FIPS 140-2 / 140-3
- Federal Information Processing Standard 140. US/Canadian validation standard for cryptographic modules.
AI and Machine Learning
- LLM
- Large Language Model. A transformer-based model trained on text at scale; the engine behind most current generative AI products.
- SLM
- Small Language Model. Compact LLMs (often <10B parameters) optimized for edge deployment, lower cost, or specific domains.
- MoE
- Mixture of Experts. Architectural pattern where a router activates a subset of “expert” subnetworks per token; high parameter count, lower active compute.
- RAG
- Retrieval-Augmented Generation. Pattern of retrieving relevant documents at query time and injecting them into the model’s context.
- RLHF
- Reinforcement Learning from Human Feedback. Post-training alignment technique that uses human preference data to shape model behavior.
- MCP
- Model Context Protocol. Open spec that lets language models invoke external tools, resources, and prompts via a JSON-RPC dialect.
- AI RMF
- AI Risk Management Framework (NIST AI 100-1). NIST’s voluntary framework for managing AI risk, with four functions: Govern, Map, Measure, Manage.
- GenAI Profile
- NIST AI 600-1. Companion profile to AI RMF specifically addressing generative-AI risks.
- OWASP LLM Top 10
- The OWASP project that catalogs the most critical LLM-application security risks (prompt injection, insecure output handling, training-data poisoning, and so on).
- Agentic AI
- AI systems that plan multi-step actions and invoke tools autonomously toward a goal, rather than producing a single response.
Privacy and Regulation
- PII
- Personally Identifiable Information. Information that can identify a specific individual, alone or in combination.
- PHI
- Protected Health Information. PII tied to health status or care, regulated under HIPAA in the US.
- GDPR
- General Data Protection Regulation. EU regulation on personal-data processing, in force since 2018.
- CCPA / CPRA
- California Consumer Privacy Act / California Privacy Rights Act. California’s GDPR-adjacent privacy regimes.
- HIPAA
- Health Insurance Portability and Accountability Act. US federal law governing PHI.
- PCI DSS
- Payment Card Industry Data Security Standard. Industry-mandated controls for entities that store, process, or transmit cardholder data.
Missing a term? Suggestions are welcome via the contact channels listed elsewhere on the site.