Omnissa Technical Acronyms

A - B

Acronyms from A through B:

  • ACL - Access control list (ACL)
  • ACSC - Australian Cyber Security Centre (ACSC)
  • AD - Active Directory (AD)
  • ADFS - Active Directory Federation Services (ADFS)
  • AES - Advanced Encryption Standard (AES)
  • AMI - Amazon Machine Images (AMI)
  • AoC PCI - Attestation of Compliance (AoC) Payment Card Industry (PCI)
  • APAC - Asia-Pacific region (APAC)
  • API - Application programming interface (API)
  • ASF - Defensive-centric perspective (ASF)
  • ASV - Approved Scanning Vendor (ASV)
  • AV - Anti-virus (AV)
  • AWF - Alternative workforce (AWF)
  • AWS - Amazon Web Services (AWS)
  • AZ - Availability Zone (AZ)
  • BC - Business Continuity (BC)
  • BC – Broadcom (BC)
  • BCR - Binding Corporate Rules (BCRs)
  • BSIMM - Building Security in Maturity Model (BSIMM)
  • BYO - Bring your own (device (BYOG) <or> key (BYOK))

C - D

Acronyms from C through D:

E - L

Acronyms from E through L:

  • EAS - Exchange ActiveSync (Microsoft’s or MS EAS)
  • EEA - European Economic Area (EEA)
  • EEA BCRs – EEA’s Binding Corporate Rules (legacy EEA BCRs)
  • ENS - Email Notification Service (ENS)
  • ETL - Intelligence Connector (ETL)
  • EUD - End user device (EUD)
  • FADP - Federal Act on Data Protection (FADP)
  • FCAPS - Fault, Configuration, Accounting, Performance, and Security (FCAPS)
  • FedRAMP - Federal Risk and Authorization Management Program (FedRAMP)
  • GDPR - General Data Protection Regulation (GDPR)
  • GPO - Group Policy Object (GPO)
  • HSTS - HTTP Strict Transport Security (HSTS)
  • IaaS - Infrastructure-as-a-Service (IaaS)
  • ICT - Information & Communications Technology (ICT)
  • IdP - Identity Provider (IdP)
  • IDS - Intrusion Detection System (IDS)
  • IP – Internet Protocol (IP)
  • IRAP - Infosec Registered Assessors Program (IRAP) Australian Gov't
  • ISGC - Information Security Governance Committee (ISGC)
  • ISM - Information Security Manual (ISM)
  • ISMS - Information Security Management System (ISMS)
  • ISO - International Standards Organization (ISO)
  • ITIL - Information Technology Infrastructure Library (ITIL)
  • IVR - Interactive voice response system (IVR)
  • JiT - Just-in-Time (JiT)
  • KMS - Key Management Service (KMS)
  • L7 - Layer 7 or application layer
  • LMS - Learning Management System (LMS)

M - P

Acronyms from M through R:

  • MFA - Multi-factor Authentication (MfA)
  • MitM - Machine-in-the-Middle (MitM) A.K.A. Man-in-the-Middle
  • N+1 powerComputation for power backup sizing should any single sys component fail
  • NCSC - UK National Cyber Security Centre (NCSC)
  • NDA - Non-disclosure agreement (NDA)
  • NIST - National Institute of Standards and Technology (NIST)
  • NVDNational Vulnerability Database (NVD)
  • OAuth - Open authorization (OAuth)
  • OCSP - Online Certificate Status Protocol (OCSP)
  • OSINT - Open-source intelligence (OSINT)
  • OSS/TP - Open-source and third-party software validation (OSS/TP)
  • OSSTMM – Open-Source Security Testing Methodology Manual (OSSTMM)
  • OWASP - Open Web Application Security Project (OWASP)
  • PBKDF2 - Password Based Key Derivation Function 2 (PBKDF2)
  • PCI-DSS - Payment Card Industry Data Security Standard (PCI-DSS)
  • PCoIP – PC over IP (PCoIP)
  • PDU - Power distribution unit (PDU)
  • PGP - Pretty Good Privacy (PGP)
  • PII - Personally Identifiable Information (PII)
  • PIV-D – Personal Identity Verification - Derived (Supported in WS1 PIV-D Manager)
  • PKCS12 – Public Key Cryptography Standard 12 (PKCS12)
  • PKI - Public key infrastructure (PKI)
  • PSR - Product Security Requirements (PSR)

R - S

Acronyms from R through S:

  • R&D - Research and development (R&D)
  • RA - Registration Authority (RA)
  • RBAC - Role-based access controls (RBAC)
  • RDS - Remote Desktop Services (RDS)
  • RDSH - Remote Desktop Session Host (RDSH)
  • REST API - Representational State Transfer (REST) App Programming Interface (API)
  • RPO - Recovery point objective (RPO)
  • RSA - Rivest–Shamir–Adleman (RSA)
  • RTO - Recovery Time Objective (RTO)
  • S/MIME - Secure/Multipurpose internet Mail Extensions (S/MIME)
  • SaaS - Software-as-a-Service (SaaS)
  • SAFECode - Software Assurance Forum for Excellence in Code (SAFECode)
  • SAML - Security Assertion Markup Language (SAML)
  • SANS/CWE - aka Common Weakness Enumeration (CWE/SANS) via MITRE
  • SCC - Standard contractual clause (SCC)
  • SCRUM – Method used for new product dev in which a team is allowed to organize itself and make changes as quickly as possible (SCRUM)
  • SDDC - Software-defined data centers (SDDCs)
  • SDK - Software Development Kit (SDK)
  • SDL - Security Development Lifecycle (SDL)
  • SDLC - Software Development Life Cycle (SDLC)
  • SECR - Security Engineering, Communications & Response (SECR)
  • SIEM - Security Information Mgmt (SIM) <and> Security Event Mgmt (SEM) combined = Security Information & Event Management (SIEM)
  • SLA - Service Level Agreement(s) (SLA)
  • SME - Subject Matter Expert(s) (SMEs)
  • SOC - Service Organization Control (SOC), when ref SOC 2 Type 2 audits from ISO
  • SOC - Security Operations Center (EUC SOC), when ref incident response (IR), logging, and monitoring and support of operations
  • SRC - Security Response Center (Legacy VSRC)
  • SSH - Secure shell (SSH)
  • SSL - Secure Sockets Layer (SSL) Retired, now (TLS)
  • SSO - Single Sign-On (SSO)
  • SSP - Self-Service Portal (SSP)
  • STRIDE - Spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE)

T - Z

Acronyms from T through Z:

  • TLS - Transport Layer Security (TLS)
  • TOTP - Time-based one-time password (TOTP)
  • TOU - Terms of Use (TOU)
  • UDP - User Datagram Protocol (UDP)
  • VCP - Certified Professional (VCP) (legacy)
  • VDI - Virtual Desktop Infrastructure (VDI)
  • VMC on AWS - Cloud on AWS (legacy)
  • VPN - Virtual private network (VPN)
  • WAF - Web Application Firewall (WAF)
  • WEB/APP - Web and app layers
  • XLS –Excel spreadsheet format (e.g. .xls & .xlsx file formats by Microsoft)
  • XSRF-TOKEN - Cross-site request forgery (XSRF or CSRF)

Feedback

Your feedback is valuable.

To comment on this paper, contact Omnissa at tech_content_feedback@omnissa.com.

Filter Tags

Workspace ONE Workspace ONE UEM Document Fundamental Overview