CMMC Compliance Glossary
63 essential terms for CMMC Level 2, NIST SP 800-171, SPRS scoring, and defense contractor cybersecurity compliance.
A3 terms
Access Control
SecurityThe largest NIST SP 800-171 control family with 22 controls governing who can access systems and data. Includes account management, separation of duties, least privilege, remote access, and wireless access restrictions.
Assessment Objective
AssessmentA specific, testable requirement defined in NIST SP 800-171A. The 110 controls expand into 320 assessment objectives. C3PAO assessors verify each objective individually; all objectives for a control must be met for it to be scored as implemented.
Audit Log
SecurityA chronological record of system activities sufficient to reconstruct and examine security-relevant events. NIST SP 800-171 Audit & Accountability (AU) controls require creating, protecting, retaining, and reviewing audit logs.
B1 term
Body of Evidence
ComplianceThe complete set of documentation a contractor presents during a C3PAO assessment. Typically includes the SSP, POA&M, network diagrams, policies, procedures, audit logs, configuration screenshots, and training records.
Evidence Collection GuideC16 terms
C3PAO
(Certified Third-Party Assessment Organization)AssessmentAn organization authorized by The Cyber AB to conduct CMMC Level 2 assessments. C3PAOs employ certified assessors who verify that contractors have implemented all 110 NIST SP 800-171 controls. There are fewer than 100 authorized C3PAOs as of 2026.
C3PAO Assessment ChecklistCAGE Code
(Commercial and Government Entity Code)DoDA five-character alphanumeric identifier assigned to entities doing business with the federal government. Required for SPRS score submission and CMMC assessment registration. Obtained through SAM.gov registration.
CCA
(Certified CMMC Assessor)AssessmentAn individual certified by The Cyber AB to conduct CMMC assessments as part of a C3PAO team. CCAs must complete training, pass exams, and maintain continuing education requirements.
CCP
(Certified CMMC Professional)AssessmentAn individual certified by The Cyber AB who can advise organizations on CMMC readiness but cannot conduct official assessments. CCPs often work as consultants helping contractors prepare for C3PAO assessments.
CMMC
(Cybersecurity Maturity Model Certification)CMMCA DoD verification framework that measures a defense contractor's cybersecurity posture across three levels. Level 2 requires implementation of all 110 NIST SP 800-171 controls and is verified by a C3PAO third-party assessment.
CMMC Level 2 GuideCMMC Level 1
CMMCThe foundational CMMC tier requiring implementation of 15 basic cybersecurity practices from FAR 52.204-21. Verified through annual self-assessment. Applies to contractors handling Federal Contract Information (FCI) but not CUI.
Level 1 vs Level 2CMMC Level 2
CMMCThe advanced CMMC tier requiring implementation of all 110 NIST SP 800-171 Rev 2 controls. Contractors handling CUI must pass a C3PAO third-party assessment. Phase 2 enforcement begins November 2026.
CMMC Level 2 GuideCMMC Level 3
CMMCThe highest CMMC tier requiring all Level 2 controls plus 24 additional controls from NIST SP 800-172. Assessed by DIBCAC (government assessors). Required for contracts involving the highest-priority CUI.
CMMC Phase 2
CMMCThe second phase of CMMC rollout beginning November 10, 2026. DoD solicitations will more broadly require CMMC Level 2 C3PAO assessments for contracts involving CUI.
Full CMMC TimelineConditional Assessment
AssessmentA CMMC assessment result where a contractor meets most but not all requirements and has a credible plan (POA&M) to close remaining gaps within 180 days. Conditional status allows contract award while the contractor completes remediation.
Configuration Management
SecurityThe process of maintaining secure baseline configurations for all systems in the CUI scope. NIST SP 800-171 CM family requires documented baselines, change control, least functionality, and restriction of unauthorized software.
Continuous Monitoring
ComplianceAn ongoing process to maintain awareness of security posture, vulnerabilities, and threats. Required by NIST SP 800-171 Security Assessment (CA) family. Includes periodic control assessments, system monitoring, and risk reassessment.
Control Family
NISTA logical grouping of related security controls in NIST SP 800-171. There are 14 families: Access Control (AC), Awareness & Training (AT), Audit & Accountability (AU), Configuration Management (CM), Identification & Authentication (IA), Incident Response (IR), Maintenance (MA), Media Protection (MP), Personnel Security (PS), Physical Protection (PE), Risk Assessment (RA), Security Assessment (CA), System & Communications Protection (SC), and System & Information Integrity (SI).
CUI
(Controlled Unclassified Information)DoDGovernment-created or owned information that requires safeguarding controls per law, regulation, or government-wide policy. CUI is not classified but must be protected from unauthorized disclosure. Common categories include technical data, export-controlled information, and critical infrastructure data.
CUI Identification GuideCUI Enclave
SecurityA segmented network environment specifically designed to process, store, and transmit CUI. By isolating CUI into an enclave, contractors reduce the number of systems in scope for CMMC, lowering both implementation cost and assessment complexity.
Enclave Architecture GuideCyber Incident
SecurityAn action taken through computer networks that compromises the security of an information system or the information it processes, stores, or transmits. Under DFARS 252.204-7012, contractors must report cyber incidents to DoD within 72 hours.
D8 terms
DCMA
(Defense Contract Management Agency)DoDThe DoD agency responsible for contract administration and oversight. DCMA's DIBCAC division conducts CMMC Level 3 assessments and oversees the assessment ecosystem.
DFARS
(Defense Federal Acquisition Regulation Supplement)DoDSupplemental regulations to the FAR that apply specifically to DoD acquisitions. DFARS clause 252.204-7012 requires contractors to implement NIST SP 800-171 controls and report cyber incidents within 72 hours.
DFARS 252.204-7012
DoDThe contract clause titled "Safeguarding Covered Defense Information and Cyber Incident Reporting." It mandates that contractors implement NIST SP 800-171, report cyber incidents to DoD within 72 hours, and flow down requirements to subcontractors.
DFARS 252.204-7019
DoDThe contract clause requiring contractors to have a current NIST SP 800-171 assessment on record in SPRS. Mandates self-assessment scoring and submission before contract award.
DFARS 252.204-7021
DoDThe contract clause requiring CMMC certification at the level specified in the solicitation. This is the clause that makes CMMC a contract requirement and includes flow-down to subcontractors.
DIB
(Defense Industrial Base)DoDThe global network of companies, universities, and research labs that designs, builds, and sustains U.S. defense systems. Over 100,000 companies and their subcontractors make up the DIB. Contractors who handle CUI are required to achieve CMMC Level 2.
DIBCAC
(Defense Industrial Base Cybersecurity Assessment Center)DoDA division of DCMA responsible for conducting CMMC Level 3 assessments (government-led) and overseeing the C3PAO ecosystem for Level 2 assessments. DIBCAC assessors are government employees.
DLP
(Data Loss Prevention)SecurityTechnologies and processes that prevent sensitive information (including CUI) from being transmitted outside authorized boundaries. DLP is a key technical control for Media Protection (MP) and System & Communications Protection (SC) families.
E2 terms
EDR
(Endpoint Detection and Response)SecuritySecurity software that continuously monitors endpoints (workstations, servers, mobile devices) for suspicious activity. EDR supports multiple NIST SP 800-171 control families including System & Information Integrity (SI) and Audit & Accountability (AU).
Evidence Artifact
ComplianceA specific document, screenshot, log, or configuration export that demonstrates implementation of a security control. C3PAO assessors review evidence artifacts for each of the 320 assessment objectives. Common artifacts include policy documents, audit log exports, configuration screenshots, and training completion records.
Evidence Collection Best PracticesF6 terms
FAR
(Federal Acquisition Regulation)DoDThe primary regulation governing all federal government acquisitions. FAR 52.204-21 defines the 15 basic safeguarding requirements for FCI that form the basis of CMMC Level 1.
FCI
(Federal Contract Information)DoDInformation provided by or generated for the government under a contract that is not intended for public release. FCI requires basic protection (CMMC Level 1). It is distinct from CUI, which requires the stronger Level 2 controls.
FedRAMP
(Federal Risk and Authorization Management Program)ComplianceA government-wide program providing a standardized approach to security assessment, authorization, and monitoring for cloud services. Using a FedRAMP Moderate authorized cloud service satisfies many NIST SP 800-171 controls and simplifies CMMC assessment scope.
FIPS 140-2
SecurityA U.S. government standard for cryptographic modules. NIST SP 800-171 requires FIPS-validated encryption for protecting CUI in transit and at rest. Common FIPS 140-2 validated algorithms include AES-256 and TLS 1.2+.
FIPS 199
Security"Standards for Security Categorization of Federal Information and Information Systems." Defines three impact levels (low, moderate, high) for confidentiality, integrity, and availability. CUI is categorized as moderate confidentiality, which drives the 800-171 control selection.
Flow-Down
DoDThe requirement for prime contractors to pass CMMC and DFARS cybersecurity obligations to their subcontractors. If a subcontractor handles CUI, they must meet the same CMMC level as the prime for that information.
G1 term
Gap Analysis
AssessmentA systematic evaluation of the difference between a contractor's current security posture and the requirements of NIST SP 800-171. Gap analysis identifies unimplemented or partially implemented controls and prioritizes remediation by SPRS weight impact.
Try Free Gap AnalysisI2 terms
Incident Response Plan
SecurityA documented set of procedures for detecting, responding to, and recovering from security incidents. Required by NIST SP 800-171 Incident Response (IR) family. Must include preparation, detection, containment, eradication, recovery, and lessons learned phases.
Inherited Control
ComplianceA security control that is provided by an external entity (e.g., a cloud service provider) rather than implemented directly by the contractor. CSPs on the FedRAMP Moderate baseline satisfy many 800-171 controls, but the contractor remains responsible for documenting the inheritance.
M1 term
MFA
(Multi-Factor Authentication)SecurityAn authentication method requiring two or more verification factors: something you know (password), something you have (token), or something you are (biometric). Required by NIST SP 800-171 control IA.L2-3.5.3 for all network access to privileged and non-privileged accounts.
N3 terms
NIST SP 800-171
NIST"Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations." A NIST special publication defining 110 security controls across 14 families. Rev 2 is the current CMMC Level 2 baseline. Rev 3 was published in 2024 but CMMC still references Rev 2.
Rev 3 Changes ExplainedNIST SP 800-171A
NIST"Assessing Security Requirements for CUI." The companion assessment guide to 800-171 defining 320 assessment objectives that C3PAOs use to evaluate control implementation. Each control has 1-5 objectives, and all must be met.
NIST SP 800-172
NIST"Enhanced Security Requirements for Protecting CUI." Defines 24 additional security controls beyond 800-171 for higher-sensitivity CUI. These form the basis of CMMC Level 3.
O3 terms
OSC
(Organization Seeking Certification)AssessmentThe formal term for a contractor undergoing a CMMC assessment. During the assessment process, the C3PAO evaluates the OSC's implementation of NIST SP 800-171 controls within the defined assessment scope.
OSCA
(Organization Seeking Certification Assessment)AssessmentThe formal CMMC assessment engagement between a C3PAO and an OSC. The OSCA process includes pre-assessment planning, on-site/remote evaluation of controls, and final scoring.
OSD
(Office of the Secretary of Defense)DoDThe principal staff element of the Secretary of Defense. OSD oversees the CMMC program and publishes the CMMC rules under 32 CFR Part 170.
P3 terms
POA&M
(Plan of Action and Milestones)ComplianceA document identifying security controls that are not yet fully implemented and the plan to close each gap. Each POA&M item includes the control ID, planned remediation actions, responsible parties, and target completion dates. Controls with an active POA&M are not deducted from the SPRS score.
Policy Document
ComplianceA formal statement of management intent that defines the rules and expectations for a specific security domain (e.g., access control, incident response). NIST SP 800-171 requires documented policies for each of the 14 control families.
Policy Documentation TemplatesPrime Contractor
DoDA company that holds a direct contract with the DoD. Primes are responsible for flowing down CMMC requirements to their subcontractors and ensuring the entire supply chain meets required cybersecurity levels.
R1 term
Remediation
ComplianceThe process of closing security gaps identified during a gap analysis or assessment. Remediation may include implementing technical controls, writing policies, training personnel, or reconfiguring systems. Effective remediation is prioritized by SPRS weight impact.
S9 terms
Scope Determination
ComplianceThe process of identifying all systems, networks, and personnel that process, store, or transmit CUI. Scope determines which assets are subject to CMMC assessment. Smaller scope means fewer controls to implement and less C3PAO assessment time.
Security Control
NISTA specific safeguard or countermeasure prescribed by NIST SP 800-171 to protect CUI. Each control has an ID (e.g., AC.L2-3.1.1), a description, and one or more assessment objectives defined in 800-171A.
Self-Assessment
AssessmentA contractor's own evaluation of their NIST SP 800-171 implementation status. Required under DFARS 252.204-7019 before contract award. The resulting score is submitted to SPRS. CMMC Level 1 and some Level 2 contracts accept self-assessments.
SIEM
(Security Information and Event Management)SecurityA system that collects, correlates, and analyzes security event data from across an organization's IT environment. SIEM supports NIST SP 800-171 audit and accountability controls (AU family) by providing centralized log management and alerting.
SPRS
(Supplier Performance Risk System)AssessmentA DoD web application where contractors submit their NIST SP 800-171 self-assessment scores. Scores range from -203 (no controls implemented) to 110 (all controls fully implemented). Contracting officers check SPRS before awarding contracts.
SPRS Score CalculatorSPRS Score
AssessmentA numerical value from -203 to 110 representing a contractor's NIST SP 800-171 compliance posture. The DoD assigns each of the 110 controls a weight of 1, 3, or 5 points. Fully implemented controls keep their points; unimplemented controls without a POA&M deduct their weight from 110.
How to Calculate Your SPRS ScoreSSP
(System Security Plan)ComplianceA formal document describing how an organization implements each of the 110 NIST SP 800-171 security controls. The SSP defines the system boundary, describes the operating environment, and details each control's implementation. Required for CMMC Level 2 assessment.
System Boundary
SecurityThe defined perimeter of all hardware, software, and network components that process, store, or transmit CUI. Everything inside the boundary is in scope for CMMC assessment. Reducing the boundary through enclave architecture lowers compliance cost.
T1 term
The Cyber AB
AssessmentFormerly the CMMC Accreditation Body (CMMC-AB). The sole authorized accreditation body for the CMMC ecosystem. The Cyber AB accredits C3PAOs, certifies individual assessors, and maintains the CMMC marketplace.
U1 term
UEI
(Unique Entity Identifier)DoDA 12-character alphanumeric identifier assigned by SAM.gov that replaced the DUNS number. Required for all federal contract registrations, SPRS submissions, and CMMC assessment records.
V1 term
Vulnerability Scanning
SecurityThe automated process of probing systems for known security weaknesses. NIST SP 800-171 control RA.L2-3.11.2 requires scanning for vulnerabilities in organizational systems periodically and when new vulnerabilities are identified.
Z1 term
Zero Trust Architecture
SecurityA security model that assumes no user, device, or network is inherently trusted. Every access request is verified regardless of location. While not explicitly required by CMMC Level 2, zero trust principles align with Access Control (AC) and Identification & Authentication (IA) controls.
Put These Terms Into Practice
Run a free 110-control NIST SP 800-171 self-assessment and get your SPRS score in real time. No credit card required.