TRA Acronyms

List of Acronyms found throughout the TRA.

Term Definition
AAA Authentication, Authorization, and Accounting
3PAO Third-Party Assessment Organization
A IPv4 Address Record
a.k.a. Also Known As
AA Address Allocation
AAAA IPv6 Address Record
AAL Authenticator Assurance Level
AC Access Control
ACA Affordable Care Act
ACE Access Control Entitlements
ACF Access Control Facility
ACL Access Control List
ACO Accountable Care Organization
ACP Access Control Product (e.g., ACF/2, RACF, TSS)
ACR Architecture Change Request
ACT Adaptive Capability Testing
AD Active Directory
AD Application Development
ADM Application Development Methodology
ADO Application Development Organization
AES Advanced Encryption Standard
AHRQ Agency for Healthcare Research and Quality
AJAX Asynchronous JavaScript and XML
ALF Application Layer Filtering
ALFA Application Layer Filtering Authorization and Authentication
ALFG Application Layer Filtering Gateway
ALOM Advanced Lights Out Manager
AMD Advanced Micro Device
AMQP Advanced Message Queuing Protocol
AO Administrative Officer
AO Authorizing Official
APF Authorized Program Facility
API Application Programming Interface
APM Application Performance Monitoring
AQ Acquisition
ARIA Accessible Rich Internet Applications
ARM Application Response Measurement
AS Autonomous System
AS3 Simple Storage Service (Amazon)
ASN Autonomous System Number
ASP Application Service Provider
ASPA Assistant Secretary for Public Affairs
ATAG Authoring Tool Accessibility Guidelines
ATO Authorization to Operate
AU Audit and Accountability
AV Anti-Virus
AWS Amazon Web Services
AZ Application Zone
AZ Availabilty Zone
BAM Business Activity Monitoring
batCAVE Continuous Authorization and Verification Engine
BDC Baltimore Data Center
BGP Border Gateway Protocol
BI Business Intelligence
BIA Business Impact Analysis
BIND Berkeley Internet Name Daemon
BLOB Binary Large Objects
BMP Bitmap
BPEL Business Process Execution Language
BR Business Rule
BRM Business Reference Model
BSD Berkeley Software Distribution License
BSR Bootstrap Router
CA Certificate Authority
CAA CMS Access Administrator
CARE Continuity Assessment and Record Evaluation
CBO Community-Based Organization
CBP CMSNet Business Partner
CBWFQ Class-Based Weighted Fair Queuing
CCB Change Control Board
CCB Configuration Control Board
CCE Common Configuration Enumeration
CCIC CMS Cybersecurity Integration Center
CCM Cloud Controls Matrix
CCO Call Center Operations
CCSS Common Configuration Scoring System
CCW Chronic Care Warehouse
CDA Central Database Administration
CDM Continuous Diagnostics and Mitigation
CDN Content Delivery Network
CDN Content Distribution Network
CE Customer Edge
CEA Chief Enterprise Architect
CEI Common Enterprise Infrastructure
CERT Carnegie Mellon University Computer Emergency Response Team
CFACTS CMS FISMA Controls Tracking System
CFR Code of Federal Regulations
CHDC Contractor-Hosted Data Center
CHPID Channel Path Identifiers
CI Cloud Infrastructure
CI Configuration Item
CI Continuous Integration
CIA Confidentiality, Integrity, and Availability
CICS Customer Information Control System
CIEM Canonical Modeling for Information Exchange Methodology
CIFS Common Internet File System
CIM Common Information Model
CIO Chief Information Officer
CIS Center for Internet Security
CISO Chief Information Security Officer
CLF Common Log Format
CLOB Character Large Objects
CM Configuration Management
CM CMS Cloud Manager
CMA Computer Matching Agreement
CMaaS Continuous Monitoring as a Service
CME Continuing Medical Education
CMIS Contractor Management Information System
CMS Centers for Medicaid & Medicare Services
CMSNet CMS Private Network
CMSR CMS Minimum Security Requirements
CNAME Canonical Name Record
CO Central Office of CMS
COB Coordination of Benefits
COBS Coordination of Benefits Service
COI Community of Interest
COOP Continuity of Operations Plan
CORS Cross-Origin Resource Sharing
CoS Class of Service
CPU Central Processing Unit
CR Change Request
CRA Cyber Risk Advisor
CRC Cyclic Redundancy Code
CROWNWeb Consolidated Renal Operations in a Web-based Network
CSA Cloud Security Alliance
CSIRC Computer Security Incident Response Center
CSM Configuration Settings Management
CSP Credential Service Provider
CSP Cloud Service Provider
CSR Customer Service Representative
CSS Cascading Style Sheets
CSV Comma Separated Variable
CTO Chief Technology Officer
CVE Common Vulnerabilities and Exposures
CVSS Common Vulnerability Scoring System
CWE™ Common Weakness Enumeration
CWF Common Working File
CY Calendar Year
D Delivery
DA Data Architecture
DASD Direct Access Storage Device
DBA Database Administrator
DBidS DMEPOS Bidding System
D-Bids Durable Medical Equipment Billing System
DBM Data and Database Management
DBMS Database Management System
DC Data Center
DCEP Data Converter Evaluation Platform
DDES Division of Data Enterprise Services
DDL Data Definition Language
DDoS Direct Denial of Service
DDPS Drug Data Processing System
DEA Division of Enterprise Architecture
DESY Data Extract Software System
DEV Development
DFM Design for Maintainability
DFS Digital Forensics Services
DHCP Dynamic Host Configuration Protocol
DHS Department of Homeland Security
DIIMP Division of IT Investment Management and Policy
DIME Direct Internet Message Encapsulation
DISA Defense Information Systems Agency
DIT Defect and Issue Tracking
DITG Division of Information Technology Governance
DLM Data Life-cycle Management
DM Data Mart
DME Durable Medical Equipment
DMEPOS Durable Medical Equipment Prosthetic, Orthotic, and Supplies
DML Data Modification Language
DMVPN Dynamic Multipoint Virtual Private Network
DMZ Demilitarized Zone
DNS Domain Name System / Domain Name Service
DNSSEC Domain Name Service Security
DoD Department of Defense
DOM Document Object Model
DoS Denial of Service
DP Device Profiler
dpi Dots per Inch
DPL Dynamic Program Link
DR Disaster Recovery
DSCP Differentiated Services Code Point
DSDL Document Schema Definition Language
DSN Data Source Name
DSS Data Storage Services
DUA Data Use Agreement
DW Data Warehouse
DZ Data Zone
E01 Expert Witness
EA Enterprise Architecture
EaaS Enterprise as a Service
EADG Enterprise Architecture and Data Group
eBGP External Border Gateway Protocol
EBP Extranet Business Partner
EC2 Amazon’s Elastic Compute Cloud
eCHIMP Electronic Change Management Portal
ECM Enterprise Content Management
ECMA European Computer Manufacturers Association
ED Engineering Documentation
EDC Enterprise Data Center
EDE Enterprise Data Environment
EDL Enterprise Data Lake
EDR Enterprise Data Repository
EDSR Enhanced Dedicated SONET Ring
EDW Enterprise Data Warehouse
EE Enterprise Edition (Java)
EF Expedited Forwarding
EFI EUA Front End Interface
EFT Enterprise File Transfer
EFT Enterprise File Transfer, Electronic File Transfer
EHR Electronic Health Record
EHRD Electronic Health Records Demonstration
EID Enterprise Identifier
EIDM Enterprise Identity Management
EIGRP Enhanced Interior Gateway Routing Protocol
EIN Employer Identification Number
EIT Electronic and Information Technology
EJB Enterprise Java Bean
ELA Enterprise License Agreement
ELDM Enterprise Logical Data Model
EMPI Enterprise Master Person Indexes
EOC Enterprise Operations Centers
EPP Endpoint Protocol
EPS Encapsulated PostScript
ERR Environmental Readiness Review
ES Enterprise Security
ESB Enterprise Service Bus
ESIM Enterprise Services for Identification Management
ESOC Enterprise Security Operations Center
ESQL Embedded Structured Query Language
ESS Enterprise Shared Services
ESSG Enterprise Shared Services Group
ETL Extract, Transform, and Load
ETL Extract, Transform, Load
EUA Enterprise User Administration
EUDC Enterprise User Data Catalog
FAL Federal Assurance Level
FAQ Frequently Asked Questions
FAR Federal Acquisition Regulation
FBI Federal Bureau of Investigation
FC Fibre Channel
FCIP Fibre Channel Over IP
FCoE Fibre Channel Over Ethernet
FDCC Federal Desktop Core Configuration
FDCCI Federal Data Center Consolidation Initiative
FedRAMP Federal Risk and Authorization Management Program
FFRDC Federally Funded Research and Development Center
FICON Fibre Connection
FID Fraud Investigation Database
FIPS Federal Information Processing Standards
FISMA Federal Information Security Modernization Act
FMAT Forensic & Malware Analysis Team
FOIA Freedom of Information Act
FOUO For Official Use Only
FQDN Fully Qualified Domain Name
FSSS Federal IT Shared Services
FT Fault Tolerance
FTI Federal Tax Information
FTP File Transfer Protocol
FTP/S File Transfer Protocol with SSL for Security
FW Firewall
FWA Firewall Administration
G2B Government-to-Business
G2C Government-to-Citizens
G2G Government-to-Government
GAO Government Accountability Office
GB Gigabyte
GD Group Director
GDOI Group Domain of Interpretation
GETVPN Group Encrypted Transport Virtual Private Network
GFE Government Furnished Equipment
GFI Government-Furnished Information
GFS Government-Furnished Software
GID Group Identifier
GIF Graphics Interchange Format
GIS Gentran Integration Suite (now called IBM Sterling Integration Suite)
GIS Geographical Information Systems
GMT Greenwich Mean Time
GNOSC Government Network Operations and Security Center
GNU GNUs Not UNIX
GOTS Government Off-the-Shelf
GPL GNU General Public License
GPO Group Policy Object
GPU Graphical Processing Unit
GRC Governance, Risk and Compliance
GRE Generic Routing Encapsulation
GSA General Services Administration
GSS General Support System
GTL Government Task Lead
GUI Graphical User Interface
GWT Google Web Toolkit
HA Highly Available
HBSS Host-Based Security Systems
HCAHPS Hospital Consumer Assessment of Healthcare Providers and Systems
HEAR HHS Enterprise Architecture Repository
HETS HIPAA Eligibility Transaction System
HETS UI HIPAA Eligibility Transaction System User Interface
HHS Department of Health and Human Services
HIDS Host-based Intrusion Detection System
HIGLAS Healthcare Integrated General Ledger Accounting System
HIPAA Health Insurance Portability and Accountability Act of 1996
HIPS Host-based Intrusion Prevention System
HITECH Health Information Technology for Economic and Clinical Health Act
HOLAP Hybrid Online Analytical Processing
HOP QDRP Hospital Outpatient Quality Data Reporting Program
HP Hewlett-Packard
HPMS Health Plan Management System
HQA Hospital Quality Alliance
HR Human Resources
HSPD Homeland Security Presidential Directive
HSRP Hot Standby Routing Protocol
HSTS HTTP Strict Transport Security
HTML HyperText Markup Language
HTTP HyperText Transport Protocol
HTTPS Secure Hypertext Transport Protocol
HTTPS Hypertext Transfer Protocol over Secure Sockets Layer
HVA High Value Assets
HW Hardware
HWAM Hardware Asset Management
I/O Input/Output
IA Information Assurance; Identification and Authentication
IAA Inter-Agency Agreement
IaaS Infrastructure as a Service
IACS Individuals Authorized Access to the CMS Computer Services
IAL Identity Assurance Level
IAM Identity and Access Management
IANA Internet Assigned Numbers Authority
IATO Interim Authority To Operate
ICD Interface Control Document
ICMPv6 Internet Control Message Protocol for IPv6
ICSA International Computer Security Association
ICT Information Communication Technology
ID Identity
ID Identifier
ID Identifier, Identity
ID/IQ Indefinite Delivery/Indefinite Quantity
IDE Integrated Development Environment
IDM Identity Management System
IDP Intrusion Detection and Prevention
IDQ Informatica Data Quality
IDR Integrated Data Repository
IDS Intrusion Detection System
IEA Information Exchange Agreement
IEEE Institute of Electrical and Electronics Engineers
IEM IBM Endpoint Manager
IETF Internet Engineering Task Force
IGP Interior Gateway Protocol
IHS IBM HTTP Server
IIOP Internet Inter-ORB Protocol
IIS Internet Information Server
IKE Internet Key Exchange
ILC Integrated IT Investment & System Life Cycle
IM Identity Manager (Sun Microsystems product)
IMAP Internet Message Access Protocol
IMT Incident Management Team
IOC Indicators of Compromise
IOS Immediate Office of the Secretary
IoT Internet of Things
IP Internet Protocol
IPA Integration Partner Agreement
IPM Infrastructure Performance Monitoring
IPMP Internet Protocol Network Multipathing
IPS Intrusion Prevention System
IPSec Internet Protocol Security
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
IR Incident Report, Incident Response
IR Incident Report
IRF Inpatient Rehabilitation Facility
IRR Implementation Readiness Review
IRT Incident Response Team
IS Information Security
IS&CTI Information Sharing and Cyber Threat Intel
IS2P Information System Security and Privacy
IS2P2 CMS Information System Security and Privacy Policy
ISA Interagency Security Agreement
ISATAP Intra-Site Automatic Tunnel Addressing Protocol
ISCI Internet Small Computer System Interface
ISCM Information Security Continuous Monitoring
iSCSI Internet Small Computer Systems Interface
ISIS IBM Sterling Integration Suite (formerly Gentran Integration Suite)
ISO Information Systems Officer
ISO International Organization for Standardization
ISP Internet Service Provider
ISPG Information Security and Privacy Group
ISPG Information Security & Privacy Group
ISRA Information Security Risk Analysis
ISSO Information Systems Security Officer
ISSO Information System Security Officer
IT Information Technology
IT PM Performance Monitoring/Management
ITCAM IBM Tivoli Application Composite Monitor
ITIL Information Technology Infrastructure Library
IUI Inductive Use Interface
IV&V Independent Verification and Validation
J2EE Java 2 Platform Enterprise Edition
Java EE Java Platform, Enterprise Edition
JCL Job Control Language
JCP Java Community Process
JDBC Java Database Connectivity
JMS Java Message Service
JMX Java Management Extensions
JNDI Java Naming and Directory Interface
JPEG/JPG Joint Photographic Experts Group
JPS Java Portlet Specification
JRA Java Resource Adapter
JRE Java Runtime Environment
JS JavaScript
JSF JavaServer Faces
JSON JavaScript Object Notation
JSONP JSON with Padding
JSP Java Server Pages
JSR Java Specification Request
KEK Key Encryption Key
KPI Key Performance Indicator
KS Key Server
KSM Keys and Secrets Management
LAN Local Area Network
LASR Lightweight Asset Summary Results
LDAP Lightweight Directory Access Protocol
LDAPS Secure LDAP, also known as “LDAP over SSL”
LDOM Logical Domain
LDP Label Distribution Protocol
LGPL GNU Lesser General Public License
LIR Local Internet Registry
LOA3 Level of Assurance 3
LPAR Logical Partition
LRECL Logical Record Length
LTC Long-Term Care
LUNS Logical Unit Numbers
MAC (address) Media access control address
MAC Medicare Administrative Contractor
MAC Medicare Administrative Contractor, Media Access Control
MAC PPO Medicare Administrative Contractor Preferred Provider Organization
MAPI Messaging Application Programming Interface
MARx Medicare Advantage and Prescription Drug System
MAS Medicare Appeals System
MBD DW Medicaid Beneficiary Database Data Warehouse
MBES Medicaid Budget &Expenditures System
MBGP Multiprotocol Border Gateway Protocol
MC Metadata Catalog
MCO Managed Care Organization
MD5 Message Digest number 5
MDB Message-Driven Bean
MDCN Medicare Data Communications Network
MDM Master Data Management
MDM Mobile Device Management
MDR Master Data Repository
MEC Multichassis Etherchannel
MED Multi-Exit Discriminator
MEDPAR Medical Provider Analysis and Review
MFA Multi-Factor Authentication
MFT Managed File Transfer
MIB Management Information Base
MIDAS Multidimensional Information and Data Analytics System
MIG Medicare Insured Group
MIIR Management Information Integrated Repository
MIIS Microsoft Identity Integration Server
MIME Multipurpose Internet Mail Extension
mIoT Medical Internet of Things
MIS Managed Internet Service
MITA Medicaid Information Technology Architecture
MLS Multi-Level Security
MMA Medicare Prescription Drug, Improvement, and Modernization Act of 2003 (Medicare Modernization Act)
MMA Medicare Modernization Act
MMS Multimedia Message Service
MOA Memorandum of Agreement
MOLAP Multidimensional Online Analytical Processing
MOU Memorandum of Understanding
MPEG Moving Picture Experts Group
MPIO Multipath Input/Output
MPL Mozilla Public License
MPLS Multiprotocol Label Switching
MQ Message Queuing
MRI Magnetic Resonance Imaging
ms millisecond
MSHTML Microsoft Hypertext Markup Language
MSIS Medicaid Statistical Information System
MSMQ Microsoft Message Queuing
MTIPS Managed Trusted Internet Provider Service
MTOM Message Transmission Optimization Mechanism
MTU Maximum Transmission Unit
MV Mainframe Virtualization
MX Mail Exchange Record
NA Network Architecture
NAC Network Asset Control
NAPTR Naming Authority Pointer Record
NARA National Archives and Records Administration
NAS Network-attached Storage
NASA National Aeronautics and Space Administration
NAT Network Address Translation
NCH National Claims History
NCPDP National Council for Prescription Drug Programs
NDM Network Data Mover
NFS Network File System
NIC Network Interface Card
NIDS Network Intrusion Detection System
NIDS Network-based Intrusion Detection System
NIEM National Information Exchange Model
NIH National Institutes of Health
NIST National Institute of Standards and Technology
NLR National Level Repository
NMUD National Medicare Utilization Database
NPD Network Protection Device
NPI National Provider Identifier
NPM Node Package Manager
NPPES National Plan and Provider Enumeration System
NPPES National Plan and Provider Enumeration System
NS Name Server
NSA National Security Agency
NSEP Network Security Endpoint Protection
NTP Network Time Protocol
NV Network Virtualization
NVD National Vulnerability Database
O&M Operations and Maintenance
OAGM Office of Acquisition and Grants Management
OASIS Organization for the Advancement of Structured Information Standards
OAuth Open standard to authorization
OC Office of Communications
OCIO Office of the Chief Information Officer
ODBC Open Database Connectivity
ODC Orthogonal Defect Classification
ODS Operational Data Store
OESS Office of E-Health Standards and Services
OFM Office of Financial Management
OID Object Identifier
OIG Office of the Inspector General
OIG Office of Inspector General
OIT Office of Information Technology
OLA Operational Level Agreement
OLAP Online Access Protocol
OLTP Online Transaction Processing
OM&M Operations and Maintenance Manual
OMB Office of Management and Budget
OMB DM Office of Management and Budget Data Mart
ONE PI One Program Integrity
OOB Out-of-Band
OPDIV Department of Health and Human Services Operating Division
ORR Operational Readiness Review
OS Operating System
OSD Open Source Definition
OSI Open Systems Interconnection
OSI Open Source Initiative
OSPF Open Shortest Path First
OSS Operations Support Systems
OSS Open Source Software
OTP One-Time Password
OWASP Open Web Application Security Project
P2P Point-to-Point Messaging
PaaS Platform as a Service
PAN Processor Area Network
PAT Port Address Translation
PB Petabyte
PBAR Part B Analytics Reports
PBKDF Password-Based Key Derivation Function
PC Personal Computer
PCAP Packet Capture
PCI Peripheral Component Interconnect
PCM Privacy Continuous Monitoring
PD Packing and Deployment
PDA Personal Digital Assistant
PDF Portable Document Format
PDF Portable Document File
PDO PHP Data Objects
PDR Preliminary Design Review
PE Provider Edge
PECOS Provider Enrollment, Chain, and Ownership System
PHB Per-Hop Behavior
PHI Protected Health Information
PHP PHP: Hypertext Preprocessor (PHP)
PHR Personal Health Record
PIA Privacy Impact Assessment
PID Process ID
PII Personally Identifiable Information
PIM-SM Protocol-Independent Multicast-Sparse Mode
PISP Policy for the Information Security Program
PKI Public Key Infrastructure
PL/SQL Oracle Procedural Language/Structured Query Language
PL/SQL Oracle Procedural Language/Structured Language
PMM Performance Monitoring and Measurement
PMO Program Management Office
PNG Portable Network Graphics
POA&M Plan of Action and Milestones
POC Point of Contact
POM Project Object Model
PoP Points of Presence
POTS Plain Old Telephone Service
PPA Project Process Agreement
PPID Parent Process ID
PQRI Physician Quality Reporting Initiative
PR/SM Processor Resource/Systems Manager
PRR Production Readiness Review
PS TIBCO Platform Server
PS&R Provider Statistics & Reimbursement Report
PSL Problem Statement Language
PSTN Public-Switched Telephone Network
PTR Pointer Record
PUB Publication
Pub/Sub Publication and Subscription Messaging
PVLAN Private Virtual Local Area Network
PZ Presentation Zone
QIES Quality Improvement Evaluation System
QIPS QualityNet Identity Provisioning System
QM Queue Manager
QoS Quality of Service
QTSO QIES Technical Support Office
R/SSO Reduced or Single Sign-On
RA Router Advertisement
RA Risk Assessment
RACF Resource Access Control Facility
RACI Responsible, Accountable, Consulted, Informed
RAID Random Array of Inexpensive Disks
RAM Random Access Memory
RAML RESTful API Modeling Language
RAPS Risk Adjustment System
RBAC Role-Based Access Control
RBS Role-Based Security
RBT Role-based Training
RCA Root Cause Analysis
RDBMS Relational Database Management System
RDP Remote Desktop Protocol (Microsoft)
RDS-COB Retiree Drug Subsidy - Coordination of Benefits
ResDAC CMS Research Data Assistance Center
REST Representational State Transfer
REXX Restructured Extended Executor
RFC Request for Comment
RFI Request for Information
RFP Request for Proposal
RIA Rich Internet Application
RIB Routing Information Base
RM Release Management
RMF Risk Management Framework
RMH Risk Management Handbook
RMI Remote Method Invocation (Java)
RO Regional Office(s) of CMS
ROLAP Relational Online Analytical Processing
RP Recommended Practice
RP Relying Party
RP Recommended Practices
RPC Remote Procedure Call
RPO Recovery Point Objective
RRB Railroad Retirement Board
RSS Rich Site Summary
RSS Really Simple Syndication
RTO Recovery Time Objective
RTT Round-Trip Time
S/FTP Secure Shell File Transfer Protocol
S3 Simple Storage Service
SA Security Administration
SA Software Architecture
SaaS Software as a Service
SAE Security Architecture and Engineering
SAML Security Assertion Markup Language
SAN Storage Area Network
SANS SysAdmin, Audit, Network, Security
SAS Serial Attached SCSI
SATA Serial Attached Technology Adapted
SB Swing Bed
SBI Software Build and Integration
SC Security Configuration; System and Communications Protection
SC Security Category
SC Security Configuration
SC Software Coding
SCA Security Control Assessment
SCAP Security Content Automation Protocol
SCM Software Configuration Management
SCSI Small Computer System Interface
SD Software Design
SDK Software Developer Kit
SDK Software Development Kit
SDLC System Development Life Cycle
SDM System Developer and Maintainer
SDOC Supplier’s Declaration of Conformity
SE Security
SEI® Software Engineering Institute
SEMG Security and Emergency Management Group
SG Services General
SGML Standard Generalized Markup Language
SHA1 Secure Hash Algorithm 1
SHA2 Secure Hash Algorithm 2
SHA256 SHA2 w/256-bit digest
SIA Security Impact Analysis
SID System ID
SIEM Security Information and Event Management
SLA Service Level Agreement
SLAAC Stateless Auto-configuration
SLO Service Level Objective
SLS Scalable Login Service
SM System Maintenance
SMB Small Message Block
SME Subject Matter Expert
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNA System Network Architecture
SNMP Simple Network Management Protocol
SO Security Operations
SOA Service-Oriented Architecture
SOAP Simple Object Access Protocol
SOC Security Operations Center
SOCaaS Security Operations Center as a Service
SONET Synchronous Optical Networking
SOP Senior Official on Privacy
SOR System of Record
SORN System of Record Notice
SP Special Publication
SPA Single Page Applications
SPI Sensitive Personal Information
SPI Security Programming Interface
SQ Software Quality
SQL Structured Query Language
sRGB Standard Red, Green, and Blue
SRM Service Reference Model
SRP Single Responsibility Principle
SS Secure Software
SSA Social Security Administration
SSD Solid-State Drive
SSH Secure Shell
SSL Secure Sockets Layer
SSN Social Security Number
SSO Single Sign-On
SSO System Security Officer
SSP System Security Plan
SSPMO Shared Services Project Management Office
ST&E Security Test and Evaluation
STAR System for Tracking Audit & Reimbursement
STIG Security Technical Implementation Guide (DISA)
STIX Structured Threat Information eXpression
SUA Software Usage Analysis
SV Server Virtualization
SVG Scalable Vector Graphics
SW Software
SWAM Software Asset Management
SWCI Software Configuration Item
T1HV Windows Virtualization
T2HV UNIX Virtualization
TAP Test Anything Protocol
TB Terabyte
TCO Total Cost of Ownership
TCP Transmission Control Protocol
TEK Traffic Encryption Key
Term Definition
TIC Trusted Internet Connectivity
TIC Trusted Internet Connection
TICAP Trusted Internet Connection Access Provider
TID Target ID
TIFF Tagged Image File Format
TLC Target Life Cycle
TLS Transport Layer Security
T-MSIS Transformed Medicaid Statistical Information System
ToS Type of Service
TP Transport Protocol
TPWA Third-Party Websites and Applications
TPWS Third-Party Web Site
TRA Technical Reference Architecture
TRB Technical Review Board
TSIG Transaction Signature
TSO Time Sharing Option
TSS Computer Associates Top Secret Security Access Control Program (ACP)
TTL Time-to-Live
TTP-HFPP Trusted Third Party – Healthcare Fraud Prevention Partnership
TWS Tivoli Workload Scheduler
TXT Text Record
UA Universal Accessibility
UAAG User Agent Accessibility Guidelines
UAT User Acceptance Testing
UC Unified Communications
UCD User-Centered Design
UDDI Universal Description, Discovery, and Integration
UDP User Datagram Protocol
UGA Unique Global Unicast Address
UID User Identifier
URI Uniform Resource Identifier
URL Universal Resource Locator
US-CERT United States Computer Emergency Response Team
USG United States Government
USGCB US Government Configuration Baseline
UTC Universal Time Coordinate
UTF Unicode Transformation Format
UX User Experience
VAT Vulnerability Assessment Team
VBS Verizon Business Systems
VC Version Control
VCS Veritas Cluster Server
VCS Version Control System
VDC Virtual Data Center
VDC Virtual Device Context
VDD Version Description Document
VDI Virtual Desktop Integration
VDM Virtual Data Mart
VI VMWare Infrastructure
VLAN Virtual Local Area Network
VM Virtual Machine
VMFS VMware Virtual Machine File System
VPC Virtual Private Cloud
vPC Virtual Port Channel
VPN Virtual Private Network
VRF Virtual Routing and Forwarding
VRR Validation Readiness Review
VSAM Virtual Storage Access Management
VSN Virtual Server Network
VSS Virtual Switching Systems
VUL Vulnerability Management
W3C World Wide Web Consortium
WADL Web Application Description Language
WAF Web Application Firewall
WAI Web Accessibility Initiative
WAN Wide Area Network
WAS WebSphere Application Server
WCAG Web Content Accessibility Guidelines
WCM Web Content Management
WCMS Web Content Management System
WDSL Web Services Description Language
WebDAV Web Distributed Authoring and Versioning
Wi-Fi Wireless Fidelity
WINS Windows Internet Name Services
WMI Windows Management Instrumentation
WPS Wisconsin Physicians Service
WS Web Services
WS-BPEL Web Services-Business Process Execution Language
WS-I Web Services Interoperability
WSRP Web Services for Remote Portlets
WSSE Web Services Security Elements
XCCDF Extensible Configuration Checklist Description Format
XHTML Extensible HyperText Markup Language
XML Extensible Markup Language
XMLA Extensible Markup Language Administration
XMLA Extensible Markup Language Authentication and Authorization
XMLG Extensible Markup Language General
XMLP Extensible Markup Language Protection
XOP XML-binary Optimized Packaging
XP Extreme Programming
XSD XML Schema Definition
XSLT Extensible Stylesheet Language Transformation
XSS Cross-Site Scripting
YUI Yahoo! User Interface
ZTA Zero Trust Architecture
ZTMM Zero Trust Maturity Model
z/VM IBM hypervisor for the virtualization technology platform supporting IBM virtual operating systems