FedRAMP Master Acronym List. Version 1.0



Similar documents
Guide to Understanding FedRAMP. Guide to Understanding FedRAMP

Overview. FedRAMP CONOPS

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

Proposed Security Assessment & Authorization for U.S. Government Cloud Computing

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Cloud Security for Federal Agencies

Security Compliance In a Post-ACA World

December 8, Security Authorization of Information Systems in Cloud Computing Environments

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

Security Authorization Process Guide

Seeing Though the Clouds

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Federal Risk and Authorization Management Program (FedRAMP)

CTR System Report FISMA

System Security Certification and Accreditation (C&A) Framework

FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO

Looking at the SANS 20 Critical Security Controls

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Esri Managed Cloud Services and FedRAMP

Information System Security Officer (ISSO) Guide

Altius IT Policy Collection Compliance and Standards Matrix

FedRAMP Standard Contract Language

Security Controls Assessment for Federal Information Systems

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Get Confidence in Mission Security with IV&V Information Assurance

Department of Homeland Security

NARA s Information Security Program. OIG Audit Report No October 27, 2014

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Security and Privacy Controls for Federal Information Systems and Organizations

Incident Management. Verdis Spearman

Final Audit Report. Report No. 4A-CI-OO

Privacy Impact Assessment

Information System Security Officer (ISSO) Guide

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

How To Write The Jab P-Ato Vulnerability Scan Requirements Guide

IT Security Management Risk Analysis and Controls

Requirements For Computer Security

HHS Information System Security Controls Catalog V 1.0

Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook

CONTINUOUS MONITORING

United States Department of Agriculture. Office of Inspector General

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

Checklist to Assess Security in IT Contracts

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release January 2015

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Compliance Overview: FISMA / NIST SP800 53

Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Critical Review/Technology Assessment (CR/TA) November Cloud Computing for the Government Sector

Chapter One: Cloud Computing Security Requirements Baseline

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

Review of the SEC s Systems Certification and Accreditation Process

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Security Control Standards Catalog

AF Life Cycle Management Center

2012 FISMA Executive Summary Report

Security Self-Assessment Tool

Continuous Monitoring Strategy & Guide

Final Audit Report -- CAUTION --

Security Features in Password Manager

Security Guide for ActiveRoles Server 6.1

INFORMATION TECHNOLOGY SECURITY POLICY Table of Contents

Lots of Updates! Where do we start?

IT Compliance in Acquisition Checklist v3.5 Page 1 of 7

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

DoD Cloud Computing Security Requirements Guide (SRG) Overview

How To Improve Federal Network Security

VA Enterprise Design Patterns: 6. Cloud Computing 6.1 Enterprise Cloud Services Broker

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

Spillage and Cloud Computing

In Brief. Smithsonian Institution Office of the Inspector General

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

FINAL Version 2.0 September 20, 2013

Security Control Standard

FISMA NIST (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Security Control Standard

Transcription:

FedRAMP Master Acronym List Version 1.0 September 10, 2015

Revision History Date Version Page(s) Description Author Sept. 10, 2014 1.0 All Initial issue. FedRAMP PMO How to Contact Us For questions about FedRAMP or this document, email to info@fedramp.gov. For more information about FedRAMP, visit the website at http://www.fedramp.gov. Page ii

Table of Contents 1. List of Acronyms... 1 List of Tables Table 1. FedRAMP Acronyms... 1 Page iii

1. LIST OF ACRONYMS Table 1 below is the master list of FedRAMP acronyms. Please send suggestions about corrections, additions, or deletions to info@fedramp.gov. Table 1. FedRAMP Acronyms Acronym 3PAO A2LA AC ACL AO APL AT ATO AU BIA CA CapEx CCB CDM CI CIOC CIS CISO CLI CM CMP CMVP ConMon COOP CO COR COTS CP CR CRM CSIRC OCSIT CSP CTW DAS DHS Meaning Third Party Assessment Organization American Association of Laboratory Accreditation Access Control Access Control List Authorizing Official Approved Products List (DOD list) Awareness and Training Authorization To Operate Audit and Accountability Business Impact Analysis / Business Impact Assessment Security Assessment and Authorization Capital Expense Change Control Board Continuous Diagnostics and Mitigation Configuration Item Chief Information Officer Council Control Implementation Summary / Control Information Summary Chief Information Security Officer Command Line Interface Configuration Management / Change Management Configuration Management Plan Cryptographic Module Validation Program Continuous Monitoring Continuity of Operations Contracting Officer Contracting Officer s Representative Commercial Off-The-Shelf Contingency Planning / Contingency Plan Change Request Customer Relationship Management Computer Security Incident Response Center Office of Citizen Services and Innovative Technologies (of GSA) Cloud Service Provider Control Tailoring Workbook Direct Attached Storage Department of Homeland Security Page 1

DNS Domain Name System ECSB Enterprise Cloud Service Broker FDCCI Federal Data Center Consolidation Initiative FedRAMP Federal Risk and Authorization Management Program FIPS Federal Information Processing Standard FISMA Federal Information Security Management Act (of 2002) FOC Final Operating Capability FTP File Transfer Protocol GSA General Services Administration GSS General Support System GUI Graphical User Interface HIPAA Health Insurance Portability and Accountability Act (of 1996) HSM Hardware Security Module HSPD 12 Homeland Security Presidential Directive 12 IA Identification and Authentication IaaS Infrastructure as a Service IEC International Electrotechnical Commission IG Inspector General / Implementation Guidance IOC Initial Operating Capability IPv4 Internet Protocol version 4 IPv6 Internet Protocol version 6 IR Incident Response iscsi Internet Small Computer System Interface ISIMC Information Security and Identity Management Committee ISO International Organization for Standardization International Organization for Standardization / International Electrotechical ISO/IEC Commission ISSO Information System Security Officer IT Information Technology ITCP IT Contingency Plan JAB (FedRAMP) Joint Authorization Board LMS Learning Management System MA Maintenance MAS Multiple Award Schedule Max Max.gov (file repository website) MP Media Protection MTIPS Managed Trusted IP Service N/A Not Applicable NARA National Archives and Records Administration NAS Network Attached Storage NAT Network Address Translation NFPA National Fire Protection Association NGO Non-Governmental Organization NISP National Industrial Security Program NIST National Institute of Standards and Technology Page 2

NNTP NPPD NTP NVI OCSIT OIG OMB OpEx OR OWASP PA PaaS P-ATO PDF PE PIA PII PIV PL PMO POA&M POC PS QA QC QM PTA RA RBAC RFC RFI RFP RIP ROB RoE SA SaaS SAF SAML SAN SAP SAR SAS SC SCSI Network News Transfer Protocol National Protection and Programs Directorate (of DHS) Network Time Protocol NAT Virtual Interface Office of Citizen Services and Innovative Technologies (us) Office of the Inspector General Office of Management and Budget Operating Expense Operational Requirement Open Web Application Security Project Provisional Authorization Platform as a Service Provisional Authorization to Operate Portable Document Format Physical and Environmental Protection Privacy Impact Assessment Personally Identifiable Information Personal Identity Verification Planning Program Management Office Plan of Action and Milestones Point of Contact Personnel Security Quality Assurance Quality Control Quality Management Privacy Threshold Analysis Risk Assessment Role-Based Access Control Request For Change Request for Information Request for Proposal Routing Information Protocol Rules of Behavior Rules of Engagement System and Services Acquisition Software as a Service Security Assessment Framework Security Assertion Markup Language Storage Area Networks Security Assessment Plan Security Assessment Report Security Assessment Support System and Communications Protection Small Computer System Interface Page 3

SI SLA SME SMS SMTP SOP SSO SSP TFTP TIC TICAP TR TR-R UPS US-CERT UUCP VLAN VPN System and Information Integrity Service Level Agreement Subject Matter Expert Short Message Service Simple Mail Transfer Protocol Standard Operating Procedure Single Sign-On System Security Plan Trivial FTP Trusted Internet Connection Trusted Internet Connection Access Providers Technical Representative Technical Representative s Representative Uninterruptible Power Source United States Computer Emergency Readiness Team Unix-to-Unix Copy Protocol Virtual Local Area Network Virtual Private Network Page 4