B. List of Acronyms

B. List of Acronyms#

AEAD

Authenticated Encryption with Associated Data

API

Application Programming Interface

ASI

(NETSCOUT) Adaptive Session Intelligence

AWS

Amazon Web Services

B&I

Break and Inspect

C2

Command and Control

CA

Certificate Authority

CFIUS

Committee on Foreign Investments in the United States

CLM

Certificate Lifecycle Management

CMS

(Mira) Central Management System

CRADA

Cooperative Research and Development Agreement

CSF

Cybersecurity Framework

DCSA

Defense Counterintelligence and Security Agency

DDoS

Distributed Denial of Service

DH

Diffie-Hellman

DMZ

Demilitarized Zone

DNS

Domain Name System

DoH

DNS over HTTPS

DoQ

DNS over QUIC

DoT

DNS over TLS

DPI

Deep Packet Inspection

DTLS

Datagram Transport Layer Security

ESXi

VMware Purpose-Built Bare Metal Hypervisor

ETO

(Mira) Encrypted Traffic Orchestrator

EVA

(NFR) Encryption Visibility Agent, (NFR) Encryption Visibility Architecture

FIPS

Federal Information Processing Standard

FOCI

Foreign Ownership, Control, or Influence

FS

Forward Secrecy

Gbps

Gigabits per second

HSM

Hardware Security Module

HTTPS

Hypertext Transfer Protocol Secure

IETF

Internet Engineering Task Force

IoT

Indicators of Compromise

IT

Information Technology

ITL

Information Technology Laboratory

JSON

JavaScript Object Notation

KVM

Kernel-based Virtual Machine

LDAP

Lightweight Directory Access Protocol

NCCoE

National Cybersecurity Center of Excellence

NDR

Network Detection and Response

NFR

Not for Radio

NIST

National Institute of Standards and Technology

NISTIR

NIST Internal or Interagency Report

OS

Operating System

PKI

Public Key Infrastructure

RBAC

Role-Based Access Control

REST

Representational State Transfer

RFC

Request for Comments

RMF

Risk Management Framework

RSA

Rivest, Shamir, Adleman

RT

Real Time

RTT

Real-Time Text

SaaS

Software-as-a-Service

SAML

Security Assertion Markup Language

SIEM

Security Information and Event Management

SMTP

Simple Mail Transfer Protocol

SOAR

Security Orchestration, Automation, and Response

SP

Special Publication

SSLO

(F5) SSL Orchestrator

SSO

Single Sign-On

TLS

Transport Layer Security

TMOS

(F5) Traffic Management Operation System

UDP

User Datagram Protocol

vETO

(Mira) Virtual Encrypted Traffic Orchestrator

VM

Virtual Machine

WebUI

Web User Interface

XDR

Extended Detection and Response