Item Type Meaning
AAD acronym Microsoft Azure Active Directory
ABB acronym Architectural Building Block (ABB). A logical container, represented in the model using a SysML 'block', that corresponds to a major IT capabability delivery subsystem within the EA. Tyically equates to a FISMA-Container.
ABBs acronym Architectural Building Blocks (plural of ABB)
ACL acronym An Access Control List is a list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
ACR acronym Architecture Change Request (ACR)
ACSI acronym American Customer Satisfaction Index
ACTO acronym Actual Cost to Operate (ACTO)
AD acronym Microsoft Active Directory
Adaptive Access Control term Adaptive Access Control combines the subject credentials and contextual information to determine the risk of granting the requested action be performed on an object and may add dynamic elements to ABAC through functions like additional authentication steps (e.g., static/dynamic knowledge-based authentication, one-time passwords, cryptographic authenticator).
ADM acronym Open Group Architecture Development Method
Agency Priority Goals term Agency Priority Goals (APGs) are a performance accountability structure of the GPRA Modernization Act that provides agencies a mechanism to focus leadership priorities, set outcomes, and measure results, bringing focus to mission areas where agencies need to drive significant progress and change. APG statements are outcome-oriented, ambitious, and measurable with specific targets set that reflect a near-term result or achievement agency leadership wants to accomplish within approximately 24 months. In some instances, agencies are also utilizing the APG structure to drive progress and monitor implementation of agency management reforms and priorities, a modification of the traditional APG statement format. Agency leaders from major Federal agencies select approximately four to five goals every two years, identify responsible officials for goal achievement, and review performance on a quarterly basis to identify barriers to progress and make changes to implementation strategies to achieve goal outcomes. APGs to be achieved throughout the course of Fiscal Years 2018-2019 have been established by major Federal agencies concurrent with the release of the President's FY 2019 Budget. <source: https://www.performance.gov/about/APG_about.html>
AO acronym Authorizing Official (FISMA)
AOR acronym Area of Responsibility. In the context of cloud governance, the AOR is logically equivilant to the scope of the applicable policy.
AP acronym Architectural Principle (AP)
APG acronym FEAF-PRM: Agency Priority Goal: Agency Priority Goals (APGs) are a performance accountability structure of the GPRA Modernization Act that provides agencies a mechanism to focus leadership priorities, set outcomes, and measure results, bringing focus to mission areas where agencies need to drive significant progress and change. For more information see https://www.performance.gov/about/APG_about.html
APGs acronym Agency Priority Goals (APGs) are a performance accountability structure of the GPRA Modernization Act that provides agencies a mechanism to focus leadership priorities, set outcomes, and measure results, bringing focus to mission areas where agencies need to drive significant progress and change.
Application encryption term Application encryption is encryption of sensitive files or specified columns in a database using an application programing interface (API).
AR acronym Architectural Requirement (AR)
ARB acronym Architecture Review Board (ARB)
ARD acronym architectural decision (ARD)
ARGO acronym Architectural Goal or Objective (ARGO)
ARM acronym FEAF: Application Reference Model (ARM)
ASG acronym Agency Strategic Goal
ASGO acronym Agency Stratetic Goals and Objectives (ASGO)
ATO acronym FISMA Authority to Operate
BCTO acronym Budgeted-Cost-To-Operate (BCTO)
BDMIS acronym Business Development Management Information System (BDMIS)
BEHAVE acronym Security-related behavioral training. <source: DHS-CDM>
BPM acronym Business Process Model (BPM)
BRM acronym FEAF: Business Reference Model (BRM)
BSC acronym Business Service Catalog (BSC)
BTIC acronym Business Technology Investment Council (BTIC)
CA acronym Certificate Authority (CA)
CAF acronym Microsoft Cloud Adoption Framework (CAF) <source: https://docs.microsoft.com/en-us/azure/architecture/cloud-adoption/>
CAFS acronym Capital Access Finance System
CAP acronym Cross Agency Priority (CAP)
CAPEX acronym Capital Expenditure
CCP acronym Common Controls Program (CCP)
CDM acronym Continuous Diagnostics and Mitigation https://www.dhs.gov/cisa/cdm Consistent with the Federal Government's deployment of Information Security Continuous Monitoring (ISCM), the DHS Continuous Diagnostics and Mitigation (CDM) Program is a dynamic approach to fortifying the cybersecurity of government networks and systems. The CDM Program provides DHS, along with Federal Agencies with capabilities and tools and identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first.
CERT acronym Cyber Event Response Team (CERT)
CFO acronym Chief Finance Officer
CGT acronym Cloud Governance Team (CGT) is a subset of CloudOps Team responsible for aligning Agency Goals (expressed as policy) with CSP resources.
CI acronym Configuration Item (CI)
Cloud Computing term Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. <NIST SP 800-145>
CloudOps acronym Cloud Operations (CloudOps) team, responsible for SBA-HCE IaaS, PaaS, and designated cyber-sensitive resources hosted by an SBA approved CSP.
CLS acronym Capital Access Login System (CLS)
CMS acronym Contract Management System
Community cloud term The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. <NIST SP 800-145>
CONOPS acronym Concept of Operations
COTS acronym Commercial-off-the-Shelf (COTS)
CPIC acronym Capital Planning and Investment Control (OMB Exhibit 300)
CRED acronym Credentials and authentication. <source: DHS-CDM>
CRM acronym Customer Relationship Management (CRM)
CSCTS acronym Customer Service Center Telecommunications System
CSM acronym Security Configuration Settings <source: DHS-CDM>
CSP acronym Cloud Service Provide (e.g. Azure, AWS, Google, IBM Cloud)
CSTCS acronym Customer Service Center Telecommunications System (CSTCS)
CyD acronym CyberDefense (CyD)
CySA acronym Cyber Situational Awareness
DBS acronym Design and Build in Security (DBS)
DCMS acronym Disaster Credit Management System
DHS acronym U.S. Department of Homeland Security
DLP acronym Data Loss Prevention
DRM acronym Data Reference Model (DRM)
DSBS acronym Dynamic Small Business Search (DSBS)
DSC acronym Desired State Configuration (DSC)
E8(a) acronym Electronic 8(a) Annual Review System
EA acronym a) Enterprise Architecture <model> b) Enterprise Architect <role>
EAE acronym Enterprise Azure Enclave (EAE)
EDMIS acronym Entrepeneurial Development Management Information System (EDMIS)
EEO acronym Equal Employment Opportunity Management System
ELA acronym a) Enterprise Learning Agenda b) Electronic Loan Application (an ODA system)
E-LEND acronym Electronic Lending System (E-LEND)
ELIPS acronym Electronic Loan Information Processing System (ELIPS)
EO acronym Executive Order
ERM acronym Enterprise Risk Management
ESB acronym Enterprise Service Bus
ESM acronym Enterprise Service Management (ESM)
E-TRAN acronym Electronic Transaction System (E-TRAN)
EXEC SEC acronym Office of the Executive Secretariat
FEAF acronym Federal Enterprise Architecture Framework
FEAF-II acronym Federal Enterprise Architecture Framework, Version 2.0
FIREs acronym Federal Incident Response Evaluations (FIREs)
Firewall - Layer 3 term Layer 3 firewalls (i.e. packet filtering firewalls) filter traffic based solely on source/destination IP, port, and protocol.
Firewall - Layer 4 term Layer 4 firewalls perform L3 fw functions plus they add the ability to track active network connections, and allow/deny traffic based on the state of those sessions (i.e. stateful packet inspection).
Firewall - Layer 7 term Layer 7 firewalls (i.e. application gateways) can do L3 and L4 FW functions, plus they include the ability to intelligently inspect the contents of those network packets. For instance, a Layer 7 firewall could deny all HTTP POST requests from Chinese IP addresses. This level of granularity comes at a performance cost, though.
FISMA acronym Federal Information Security Management Modernization Act
FMS acronym Financial Management System (FMS)
FTA acronym Fiscal Transfer Agent (FTA)
FTE acronym Full-Time Equivalent
FTI acronym Federal Tax Information
FY acronym Fiscal Year
GCBD acronym Office of Government Contracting and Business Development
GDB acronym graph database (GDB)
GFE acronym Government Furnished Equipment (GFE)
GLS acronym General Login System (GLS)
GOST acronym Goals, Objectives, Strategies, Tactics (GOST)
GPRA acronym Government Performance and Results Act (GPRA) https://obamawhitehouse.archives.gov/omb/mgmt-gpra/index-gpra
GPRAMA acronym Government Performance and Results Act (GPRA) Modernization Act of 2010
GSS acronym An interconnected set of information resources under the same direct management control that shares common functionality. It normally includes hardware, software, information, data, applications, communications, and people. Source(s): CNSSI 4009-2015 (OMB Circular A-130, Appendix III) NIST SP 800-18 Rev. 1 under General Support System (OMB Circular A-130, Appendix III) NIST SP 800-60 Vol. 1 Rev. 1 under General Support System (OMB Circular A-130, Appendix III) NIST SP 800-60 Vol. 2 Rev. 1 under General Support System (OMB Circular A-130, Appendix III)
GUID acronym Globally Unique ID: TO-DO:Provide examples of GUID generation across platforms. Provide examples of non-GUID and GUID objects.
HADR acronym High-Availability, Disaster Recovery (HADR)
HASU acronym Hearing and Appeal Submission Upload
HCA acronym Hybrid Cloud Architecture
HCE acronym Hybrid Cloud Environment
HCOP acronym Human Capital Operating Plan
HQDSS acronym Headquarters Data Services System (HQDSS)
HSSE acronym Heath and Safety Services (HSSE)
HUBZone acronym Historically Underutilized Business Zone
HWAM acronym Hardware Asset Management <source: DHS-CDM>
Hybrid cloud term The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). <NIST SP 800-145>
Hybrid IT term Hybrid IT is a term that refers to the combined and simultaneous consumptionof cloud and traditional IT models to deliverIT servicesin production. <source- OACA)
IAW acronym In accordance with
ILPERS acronym Intermediary Lending Program Electronic Reporting System (ILPERS)
Infrastructure as a Service (IaaS) term The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). <NIST SP 800-145>
IRM acronym a) FEAF: Infrastructure Reference Model (IRM) b) DHS-CDM: Information Rights Management (IRM)
ITSM acronym Information Technology Service Management (ITIL)
IZA acronym Institute of Labor Economics
JAAMS acronym Join Account and Adminstrative Management System
L/LMS acronym Loan/Lender Monitoring System
LAN acronym Local Area Network (LAN)
LLT acronym Long lived transactions (LLTs) hold on to database resources for relatively long periods of time, significantly delaying the termination of shorter and more common transactions. A LLT is a saga if it can be written as a sequence of transactions that can be interleaved with other transactions. The database management system guarantees that either all the transactions in a saga are successfully completed or compensating transactions are run to amend a partial execution. Both the concept of saga and its implementation are relatively simple, but they have the potential to significantly impact performance significantly. <ACM O-89791-236-5/87/0005/0249>
MA acronym FEAF-PRM Measurement Area
MC acronym FEAF-PRM Measurement category
MCAS term Microsoft Cloud App Security (MCAS).
MCS acronym Mission Critical System (MCS)
MCW acronym Any workload served by or hosted on an Mission Critical System (MCS)
MDR acronym DHS-CDM: Master Device Record
MIR acronym DHS-CDM: Master Incident Record
MNA acronym Mergers and Acquisitions (MNA)
MNGEVT acronym DHS-CDM: Managing Events (MNGEVT)
MPERS acronym Microloan Program Electronic Reporting System (MPERS)
MSR acronym DHS-CDM: Master System Record
MUR acronym DHS-CDM: Master User Record
NAP acronym Network Access Protection, a service that protects networks, both public and private from malware such as viruses and spyware.
NOC acronym Network Operations Center (NOC)
NVD acronym National Vulnerability Database
NWBC acronym National Women’s Business Council
OACA acronym The Open Alliance for Cloud Adoption (https://www.oaca-project.org/), a Linux Foundation Proiject
OAS acronym Office of Administrative Services
OBED acronym Office of Business and Economic Development
OCA acronym Office of Capital Access
OCIO acronym Office of the Chief Information Officer
OCORM acronym Office of Continuous Operations and Risk Management
OCRM acronym Office of Credit Risk Management (OCRM)
ODA acronym Office of Disaster Assistance
ODICR acronym Office of Diversity, Inclusion and Civil Rights
OED acronym Office of Entrepenurial Development
OEMISS acronym Office of Executive Management, Installation and Support Services
OGC acronym Office of the General Counsel
OGM acronym Office of Grants Management
OIG acronym Office of the Inspector General (OIG)
OII acronym Office of Investment and Innovation
OMB acronym U.S. Office of Management and Budget
OMC acronym Office of Marketing and Communication
ONO acronym Office of National Ombudsman
OP acronym Organizational Person
OPEX acronym Operational Expenditure
OPM acronym Office of Performance Management
OPS acronym Office of Personnel Security
OU acronym Organizational Unit
PACS acronym Physical Access Control System (PACS) An automated system that manages the passage of people or assets through an opening(s) in a secure perimeter(s) based on a set of authorization rules.
PEAP acronym Protected Extensible Authentication Protocol, is a protocol that encapsulates the extensible authentication protocol within an encrypted and authenticated transport layer security.
PHI acronym Protected Health Information
PII acronym Personally Identifiable Information
PIMS acronym Partner Information Management System (PIMS)
PKI acronym A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Platform as a Service (PaaS) term The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. <NIST SP 800-145>
PoP acronym Point-of-Precense (PoP) An artificial (logical) demarcation point or interface point between communicating entities. A common example is an Internet point of presence, the local access point that allows users to connect to the Internet with their Internet service provider (ISP)
Principal term A subset of subject that is represented by an account, role or other unique identifier. When we get to the level of implementation details, principals are the unique keys we use in access control lists. They may represent human users, automation, applications, connections, etc.
PRIV acronym Management and control of account/access/managed privileges. <source: DHS-CDM>
Privacy Data term Privacy data includes any data subject to the Privacy Act of 1974, as amended. This includes Personally Identifiable Information (PII), Protected Health Information (PHI), and Federal Tax Information (FTI) among others.
Private cloud term The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. <NIST SP 800-145>
PRM acronym FEAF v2: Performance Reference Model (PRM)
PSB acronym Preferred Surety Bond (PSB)
PU acronym Privileged User(s) (PU)
Public cloud term The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. <NIST SP 800-145>
RACI acronym Responsible, accountable, consulted and informed. A RACI chart is a matrix of all the activities or decision making authorities undertaken in an organisation set against all the people or roles.
RG acronym Azure Resource Group
RIB acronym Routing Information Base (RIB): Synonomous with Routing Table
RMF acronym Risk Management Framework (NIST SP 800-37)
RRAS acronym Windows Routing and Remote Access Server
Saga term A saga is a sequence of local transactions where each transaction updates data within a single service. The first transaction is initiated by an external request corresponding to the system operation, and then each subsequent step is triggered by the completion of the previous one. The two most means of implementing a saga transaction are:
  • Events/Choreography: When there is no central coordination, each service produces and listen to other service’s events and decides if an action should be taken or not
  • Command/Orchestration: when a coordinator service is responsible for centralizing the saga’s decision making and sequencing business logic.
SBA acronym Small Business Administration
SBA Component term SBA Program Offices and the Office of Inspector General (OIG) are referred to as SBA Components.
SBDC acronym Small Business Development Center
SBG acronym Surety Bond Guarantee
SBIC acronym Small Business Investment Company
SBIR acronym Small Business Innovation Research
SBSS acronym Small Business Source Syscem (SBSS)
SCAP acronym Security Content Automation Protocol
SCDO acronym Secure Cloud DevOps
SCRM acronym FEAF: Service Componet Reference Model (SCRM)
SecDevOps acronym Secure Development Operations (SecDevOps)
SIB acronym Standards Information Base
SIEM acronym Security Incident and Event Management
SOA acronym service-oriented architecture (SOA)
SOC acronym Security Operations Center (SOC)
Software as a Service (SaaS) term The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. <NIST SP 800-145>
SRM acronym FEAF: Security Reference Model (SRM)
STEP acronym State Trade Expansion Program
Strategic Objective term Strategic Objectives reflect the outcome or management impacts the agency is trying to achieve over the term of an Administration. They express the results or direction the agency will work to achieve to make progress on its mission. Strategic Objectives advance the long-term outcomes identified in the Agency Strategic Plan, and are supported by more specific performance goals and indicators. Annually, agency leaders review progress being made on each of its strategic objectives in the Agency Strategic Plan by conducting a Strategic Review. An annual assessment that synthesizes available performance information and other evidence, the Strategic Reviews are designed to inform budget, legislative, and management decisions. <source: https://www.performance.gov/about/objectives_about.html>
STTR acronym Small Business Technology Transfer
Subject term In a security context, a subject is any entity that requests access to an object. These are generic terms used to denote the thing requesting access and the thing the request is made against. When you log onto an application you are the subject and the application is the object. When someone knocks on your door the visitor is the subject requesting access and your home is the object access is requested of.
SWAM acronym Software Asset Management <source: DHS-CDM>
SWOT acronym Strengths, Weaknesses/Limitations, Opportunities
syslog-ng acronym syslog-ng is a free and open-source implementation of the syslog protocol for Unix and Unix-like systems. It extends the original syslogd model with content-based filtering, rich filtering capabilities, flexible configuration options and adds important features to syslog, like using TCP for transport.
TCO acronym Total Cost to Operate (TCO)
TOL acronym Task Order Lead (TOL)
TPCC acronym Trade Promotion Coordinating Committee
TRM acronym Technical Reference Model
Trustworthiness term Objective trustworthiness is a direct measure of a model/element's fidelity to what's being modeled; Verified through test. Subjective trustworthiness is an indirect measure where measure-of-trust is declared by an authoritative organizational entity.
UEBA acronym User and Entity Behavior Analytics
USEAC acronym U.S. Export Assistance Centers
User term A subset of principal usually referring to a human operator. The distinction is blurring over time because the words "user" or "user ID" are commonly interchanged with "account". However, when you need to make the distinction between the broad class of things that are principals and the subset of these that are interactive operators driving transactions in a non-deterministic fashion, "user" is the right word.
VBOC acronym Veterans Business Outreach Center
VoIP acronym Voice of IP protocol.
VPN acronym Virtual Private Network (VPN)
VPS acronym Virtual private server: A virtual private server is a virtual machine sold as a service by an Internet hosting service. The virtual dedicated server has also a similar meaning.
VUL acronym Software Vulnerabilities <source: DHS-CDM>
WAN acronym Wide Area Network (WAN)
WBC acronym Women’s Business Center