B. List of Acronyms#
AEAD |
Authenticated Encryption with Associated Data |
API |
Application Programming Interface |
ASI |
(NETSCOUT) Adaptive Session Intelligence |
AWS |
Amazon Web Services |
B&I |
Break and Inspect |
C2 |
Command and Control |
CA |
Certificate Authority |
CFIUS |
Committee on Foreign Investments in the United States |
CLM |
Certificate Lifecycle Management |
CMS |
(Mira) Central Management System |
CRADA |
Cooperative Research and Development Agreement |
CSF |
Cybersecurity Framework |
DCSA |
Defense Counterintelligence and Security Agency |
DDoS |
Distributed Denial of Service |
DH |
Diffie-Hellman |
DMZ |
Demilitarized Zone |
DNS |
Domain Name System |
DoH |
DNS over HTTPS |
DoQ |
DNS over QUIC |
DoT |
DNS over TLS |
DPI |
Deep Packet Inspection |
DTLS |
Datagram Transport Layer Security |
ESXi |
VMware Purpose-Built Bare Metal Hypervisor |
ETO |
(Mira) Encrypted Traffic Orchestrator |
EVA |
(NFR) Encryption Visibility Agent, (NFR) Encryption Visibility Architecture |
FIPS |
Federal Information Processing Standard |
FOCI |
Foreign Ownership, Control, or Influence |
FS |
Forward Secrecy |
Gbps |
Gigabits per second |
HSM |
Hardware Security Module |
HTTPS |
Hypertext Transfer Protocol Secure |
IETF |
Internet Engineering Task Force |
IoT |
Indicators of Compromise |
IT |
Information Technology |
ITL |
Information Technology Laboratory |
JSON |
JavaScript Object Notation |
KVM |
Kernel-based Virtual Machine |
LDAP |
Lightweight Directory Access Protocol |
NCCoE |
National Cybersecurity Center of Excellence |
NDR |
Network Detection and Response |
NFR |
Not for Radio |
NIST |
National Institute of Standards and Technology |
NISTIR |
NIST Internal or Interagency Report |
OS |
Operating System |
PKI |
Public Key Infrastructure |
RBAC |
Role-Based Access Control |
REST |
Representational State Transfer |
RFC |
Request for Comments |
RMF |
Risk Management Framework |
RSA |
Rivest, Shamir, Adleman |
RT |
Real Time |
RTT |
Real-Time Text |
SaaS |
Software-as-a-Service |
SAML |
Security Assertion Markup Language |
SIEM |
Security Information and Event Management |
SMTP |
Simple Mail Transfer Protocol |
SOAR |
Security Orchestration, Automation, and Response |
SP |
Special Publication |
SSLO |
(F5) SSL Orchestrator |
SSO |
Single Sign-On |
TLS |
Transport Layer Security |
TMOS |
(F5) Traffic Management Operation System |
UDP |
User Datagram Protocol |
vETO |
(Mira) Virtual Encrypted Traffic Orchestrator |
VM |
Virtual Machine |
WebUI |
Web User Interface |
XDR |
Extended Detection and Response |