Skip to main content
Back to Home

CMMC Compliance Glossary

63 essential terms for CMMC Level 2, NIST SP 800-171, SPRS scoring, and defense contractor cybersecurity compliance.

A3 terms

Access Control

Security

The largest NIST SP 800-171 control family with 22 controls governing who can access systems and data. Includes account management, separation of duties, least privilege, remote access, and wireless access restrictions.

Assessment Objective

Assessment

A specific, testable requirement defined in NIST SP 800-171A. The 110 controls expand into 320 assessment objectives. C3PAO assessors verify each objective individually; all objectives for a control must be met for it to be scored as implemented.

Audit Log

Security

A chronological record of system activities sufficient to reconstruct and examine security-relevant events. NIST SP 800-171 Audit & Accountability (AU) controls require creating, protecting, retaining, and reviewing audit logs.

B1 term

Body of Evidence

Compliance

The complete set of documentation a contractor presents during a C3PAO assessment. Typically includes the SSP, POA&M, network diagrams, policies, procedures, audit logs, configuration screenshots, and training records.

Evidence Collection Guide

C16 terms

C3PAO

(Certified Third-Party Assessment Organization)Assessment

An organization authorized by The Cyber AB to conduct CMMC Level 2 assessments. C3PAOs employ certified assessors who verify that contractors have implemented all 110 NIST SP 800-171 controls. There are fewer than 100 authorized C3PAOs as of 2026.

C3PAO Assessment Checklist

CAGE Code

(Commercial and Government Entity Code)DoD

A five-character alphanumeric identifier assigned to entities doing business with the federal government. Required for SPRS score submission and CMMC assessment registration. Obtained through SAM.gov registration.

CCA

(Certified CMMC Assessor)Assessment

An individual certified by The Cyber AB to conduct CMMC assessments as part of a C3PAO team. CCAs must complete training, pass exams, and maintain continuing education requirements.

CCP

(Certified CMMC Professional)Assessment

An individual certified by The Cyber AB who can advise organizations on CMMC readiness but cannot conduct official assessments. CCPs often work as consultants helping contractors prepare for C3PAO assessments.

CMMC

(Cybersecurity Maturity Model Certification)CMMC

A DoD verification framework that measures a defense contractor's cybersecurity posture across three levels. Level 2 requires implementation of all 110 NIST SP 800-171 controls and is verified by a C3PAO third-party assessment.

CMMC Level 2 Guide

CMMC Level 1

CMMC

The foundational CMMC tier requiring implementation of 15 basic cybersecurity practices from FAR 52.204-21. Verified through annual self-assessment. Applies to contractors handling Federal Contract Information (FCI) but not CUI.

Level 1 vs Level 2

CMMC Level 2

CMMC

The advanced CMMC tier requiring implementation of all 110 NIST SP 800-171 Rev 2 controls. Contractors handling CUI must pass a C3PAO third-party assessment. Phase 2 enforcement begins November 2026.

CMMC Level 2 Guide

CMMC Level 3

CMMC

The highest CMMC tier requiring all Level 2 controls plus 24 additional controls from NIST SP 800-172. Assessed by DIBCAC (government assessors). Required for contracts involving the highest-priority CUI.

CMMC Phase 2

CMMC

The second phase of CMMC rollout beginning November 10, 2026. DoD solicitations will more broadly require CMMC Level 2 C3PAO assessments for contracts involving CUI.

Full CMMC Timeline

Conditional Assessment

Assessment

A CMMC assessment result where a contractor meets most but not all requirements and has a credible plan (POA&M) to close remaining gaps within 180 days. Conditional status allows contract award while the contractor completes remediation.

Configuration Management

Security

The process of maintaining secure baseline configurations for all systems in the CUI scope. NIST SP 800-171 CM family requires documented baselines, change control, least functionality, and restriction of unauthorized software.

Continuous Monitoring

Compliance

An ongoing process to maintain awareness of security posture, vulnerabilities, and threats. Required by NIST SP 800-171 Security Assessment (CA) family. Includes periodic control assessments, system monitoring, and risk reassessment.

Control Family

NIST

A logical grouping of related security controls in NIST SP 800-171. There are 14 families: Access Control (AC), Awareness & Training (AT), Audit & Accountability (AU), Configuration Management (CM), Identification & Authentication (IA), Incident Response (IR), Maintenance (MA), Media Protection (MP), Personnel Security (PS), Physical Protection (PE), Risk Assessment (RA), Security Assessment (CA), System & Communications Protection (SC), and System & Information Integrity (SI).

CUI

(Controlled Unclassified Information)DoD

Government-created or owned information that requires safeguarding controls per law, regulation, or government-wide policy. CUI is not classified but must be protected from unauthorized disclosure. Common categories include technical data, export-controlled information, and critical infrastructure data.

CUI Identification Guide

CUI Enclave

Security

A segmented network environment specifically designed to process, store, and transmit CUI. By isolating CUI into an enclave, contractors reduce the number of systems in scope for CMMC, lowering both implementation cost and assessment complexity.

Enclave Architecture Guide

Cyber Incident

Security

An action taken through computer networks that compromises the security of an information system or the information it processes, stores, or transmits. Under DFARS 252.204-7012, contractors must report cyber incidents to DoD within 72 hours.

D8 terms

DCMA

(Defense Contract Management Agency)DoD

The DoD agency responsible for contract administration and oversight. DCMA's DIBCAC division conducts CMMC Level 3 assessments and oversees the assessment ecosystem.

DFARS

(Defense Federal Acquisition Regulation Supplement)DoD

Supplemental regulations to the FAR that apply specifically to DoD acquisitions. DFARS clause 252.204-7012 requires contractors to implement NIST SP 800-171 controls and report cyber incidents within 72 hours.

DFARS 252.204-7012

DoD

The contract clause titled "Safeguarding Covered Defense Information and Cyber Incident Reporting." It mandates that contractors implement NIST SP 800-171, report cyber incidents to DoD within 72 hours, and flow down requirements to subcontractors.

DFARS 252.204-7019

DoD

The contract clause requiring contractors to have a current NIST SP 800-171 assessment on record in SPRS. Mandates self-assessment scoring and submission before contract award.

DFARS 252.204-7021

DoD

The contract clause requiring CMMC certification at the level specified in the solicitation. This is the clause that makes CMMC a contract requirement and includes flow-down to subcontractors.

DIB

(Defense Industrial Base)DoD

The global network of companies, universities, and research labs that designs, builds, and sustains U.S. defense systems. Over 100,000 companies and their subcontractors make up the DIB. Contractors who handle CUI are required to achieve CMMC Level 2.

DIBCAC

(Defense Industrial Base Cybersecurity Assessment Center)DoD

A division of DCMA responsible for conducting CMMC Level 3 assessments (government-led) and overseeing the C3PAO ecosystem for Level 2 assessments. DIBCAC assessors are government employees.

DLP

(Data Loss Prevention)Security

Technologies and processes that prevent sensitive information (including CUI) from being transmitted outside authorized boundaries. DLP is a key technical control for Media Protection (MP) and System & Communications Protection (SC) families.

E2 terms

EDR

(Endpoint Detection and Response)Security

Security software that continuously monitors endpoints (workstations, servers, mobile devices) for suspicious activity. EDR supports multiple NIST SP 800-171 control families including System & Information Integrity (SI) and Audit & Accountability (AU).

Evidence Artifact

Compliance

A specific document, screenshot, log, or configuration export that demonstrates implementation of a security control. C3PAO assessors review evidence artifacts for each of the 320 assessment objectives. Common artifacts include policy documents, audit log exports, configuration screenshots, and training completion records.

Evidence Collection Best Practices

F6 terms

FAR

(Federal Acquisition Regulation)DoD

The primary regulation governing all federal government acquisitions. FAR 52.204-21 defines the 15 basic safeguarding requirements for FCI that form the basis of CMMC Level 1.

FCI

(Federal Contract Information)DoD

Information provided by or generated for the government under a contract that is not intended for public release. FCI requires basic protection (CMMC Level 1). It is distinct from CUI, which requires the stronger Level 2 controls.

FedRAMP

(Federal Risk and Authorization Management Program)Compliance

A government-wide program providing a standardized approach to security assessment, authorization, and monitoring for cloud services. Using a FedRAMP Moderate authorized cloud service satisfies many NIST SP 800-171 controls and simplifies CMMC assessment scope.

FIPS 140-2

Security

A U.S. government standard for cryptographic modules. NIST SP 800-171 requires FIPS-validated encryption for protecting CUI in transit and at rest. Common FIPS 140-2 validated algorithms include AES-256 and TLS 1.2+.

FIPS 199

Security

"Standards for Security Categorization of Federal Information and Information Systems." Defines three impact levels (low, moderate, high) for confidentiality, integrity, and availability. CUI is categorized as moderate confidentiality, which drives the 800-171 control selection.

Flow-Down

DoD

The requirement for prime contractors to pass CMMC and DFARS cybersecurity obligations to their subcontractors. If a subcontractor handles CUI, they must meet the same CMMC level as the prime for that information.

G1 term

Gap Analysis

Assessment

A systematic evaluation of the difference between a contractor's current security posture and the requirements of NIST SP 800-171. Gap analysis identifies unimplemented or partially implemented controls and prioritizes remediation by SPRS weight impact.

Try Free Gap Analysis

I2 terms

Incident Response Plan

Security

A documented set of procedures for detecting, responding to, and recovering from security incidents. Required by NIST SP 800-171 Incident Response (IR) family. Must include preparation, detection, containment, eradication, recovery, and lessons learned phases.

Inherited Control

Compliance

A security control that is provided by an external entity (e.g., a cloud service provider) rather than implemented directly by the contractor. CSPs on the FedRAMP Moderate baseline satisfy many 800-171 controls, but the contractor remains responsible for documenting the inheritance.

M1 term

MFA

(Multi-Factor Authentication)Security

An authentication method requiring two or more verification factors: something you know (password), something you have (token), or something you are (biometric). Required by NIST SP 800-171 control IA.L2-3.5.3 for all network access to privileged and non-privileged accounts.

N3 terms

NIST SP 800-171

NIST

"Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations." A NIST special publication defining 110 security controls across 14 families. Rev 2 is the current CMMC Level 2 baseline. Rev 3 was published in 2024 but CMMC still references Rev 2.

Rev 3 Changes Explained

NIST SP 800-171A

NIST

"Assessing Security Requirements for CUI." The companion assessment guide to 800-171 defining 320 assessment objectives that C3PAOs use to evaluate control implementation. Each control has 1-5 objectives, and all must be met.

NIST SP 800-172

NIST

"Enhanced Security Requirements for Protecting CUI." Defines 24 additional security controls beyond 800-171 for higher-sensitivity CUI. These form the basis of CMMC Level 3.

O3 terms

OSC

(Organization Seeking Certification)Assessment

The formal term for a contractor undergoing a CMMC assessment. During the assessment process, the C3PAO evaluates the OSC's implementation of NIST SP 800-171 controls within the defined assessment scope.

OSCA

(Organization Seeking Certification Assessment)Assessment

The formal CMMC assessment engagement between a C3PAO and an OSC. The OSCA process includes pre-assessment planning, on-site/remote evaluation of controls, and final scoring.

OSD

(Office of the Secretary of Defense)DoD

The principal staff element of the Secretary of Defense. OSD oversees the CMMC program and publishes the CMMC rules under 32 CFR Part 170.

P3 terms

POA&M

(Plan of Action and Milestones)Compliance

A document identifying security controls that are not yet fully implemented and the plan to close each gap. Each POA&M item includes the control ID, planned remediation actions, responsible parties, and target completion dates. Controls with an active POA&M are not deducted from the SPRS score.

Policy Document

Compliance

A formal statement of management intent that defines the rules and expectations for a specific security domain (e.g., access control, incident response). NIST SP 800-171 requires documented policies for each of the 14 control families.

Policy Documentation Templates

Prime Contractor

DoD

A company that holds a direct contract with the DoD. Primes are responsible for flowing down CMMC requirements to their subcontractors and ensuring the entire supply chain meets required cybersecurity levels.

R1 term

Remediation

Compliance

The process of closing security gaps identified during a gap analysis or assessment. Remediation may include implementing technical controls, writing policies, training personnel, or reconfiguring systems. Effective remediation is prioritized by SPRS weight impact.

S9 terms

Scope Determination

Compliance

The process of identifying all systems, networks, and personnel that process, store, or transmit CUI. Scope determines which assets are subject to CMMC assessment. Smaller scope means fewer controls to implement and less C3PAO assessment time.

Security Control

NIST

A specific safeguard or countermeasure prescribed by NIST SP 800-171 to protect CUI. Each control has an ID (e.g., AC.L2-3.1.1), a description, and one or more assessment objectives defined in 800-171A.

Self-Assessment

Assessment

A contractor's own evaluation of their NIST SP 800-171 implementation status. Required under DFARS 252.204-7019 before contract award. The resulting score is submitted to SPRS. CMMC Level 1 and some Level 2 contracts accept self-assessments.

Shared Responsibility Model

Compliance

A framework where the cloud service provider and the contractor each bear responsibility for specific security controls. The contractor must document which controls are fully implemented, partially inherited, or fully inherited from the provider.

SIEM

(Security Information and Event Management)Security

A system that collects, correlates, and analyzes security event data from across an organization's IT environment. SIEM supports NIST SP 800-171 audit and accountability controls (AU family) by providing centralized log management and alerting.

SPRS

(Supplier Performance Risk System)Assessment

A DoD web application where contractors submit their NIST SP 800-171 self-assessment scores. Scores range from -203 (no controls implemented) to 110 (all controls fully implemented). Contracting officers check SPRS before awarding contracts.

SPRS Score Calculator

SPRS Score

Assessment

A numerical value from -203 to 110 representing a contractor's NIST SP 800-171 compliance posture. The DoD assigns each of the 110 controls a weight of 1, 3, or 5 points. Fully implemented controls keep their points; unimplemented controls without a POA&M deduct their weight from 110.

How to Calculate Your SPRS Score

SSP

(System Security Plan)Compliance

A formal document describing how an organization implements each of the 110 NIST SP 800-171 security controls. The SSP defines the system boundary, describes the operating environment, and details each control's implementation. Required for CMMC Level 2 assessment.

System Boundary

Security

The defined perimeter of all hardware, software, and network components that process, store, or transmit CUI. Everything inside the boundary is in scope for CMMC assessment. Reducing the boundary through enclave architecture lowers compliance cost.

T1 term

The Cyber AB

Assessment

Formerly the CMMC Accreditation Body (CMMC-AB). The sole authorized accreditation body for the CMMC ecosystem. The Cyber AB accredits C3PAOs, certifies individual assessors, and maintains the CMMC marketplace.

U1 term

UEI

(Unique Entity Identifier)DoD

A 12-character alphanumeric identifier assigned by SAM.gov that replaced the DUNS number. Required for all federal contract registrations, SPRS submissions, and CMMC assessment records.

V1 term

Vulnerability Scanning

Security

The automated process of probing systems for known security weaknesses. NIST SP 800-171 control RA.L2-3.11.2 requires scanning for vulnerabilities in organizational systems periodically and when new vulnerabilities are identified.

Z1 term

Zero Trust Architecture

Security

A security model that assumes no user, device, or network is inherently trusted. Every access request is verified regardless of location. While not explicitly required by CMMC Level 2, zero trust principles align with Access Control (AC) and Identification & Authentication (IA) controls.

Put These Terms Into Practice

Run a free 110-control NIST SP 800-171 self-assessment and get your SPRS score in real time. No credit card required.

Start Free Assessment