Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
46
9.2k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
9.02k
According to Security Strategies for Microservices-based Application Systems: 3.2.1 Service Discovery Mechanism Threats The basic functions in a service discovery mechanism are: - Service registration and de-registration.
[ -0.049240943, 0.037581105, 0.061965067, -0.02159317, -0.015999759, 0.027931582, -0.037131738, -0.01001611, -0.014947299, 0.0011877131, 0.01466349, -0.07114158, 0.027174758, -0.008449244, -0.016188966, 0.013729284, -0.030083803, 0.03145555, -0.0030036503, 0.009146943, 0.054633...
0
According to Guidelines on Active Content and Mobile Code: | Executive Summary..............................................................................................................ES-1 | Executive Summary..............................................................................................................ES-1 | Executive Summary..............................................................................................................ES-1 | |---------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | 1.
[ 0.04985571, 0.048138488, 0.0064818054, 0.004359911, 0.024618192, -0.009071712, -0.020747406, -0.05523258, 0.02045182, 0.019748041, 0.037919614, -0.03943978, 0.0101273805, 0.0013327816, 0.0050179446, 0.017833762, 0.0029998582, -0.010331477, 0.030853674, 0.036962476, 0.03105073...
1
According to Automation Support for Security Control Assessments_ Volume 1_ Overview: 3.5.2 Tracing Security Control Items to Capabilities... 3.5.2 Tracing Security Control Items to Capabilities), sub-capabilities were derived to more fully demonstrate how the HWAM controls work together to achieve the purposes of HWAM (see 3. 3.5.2 Tracing Security Control Items to Capabilities In defining individual security control items from SP 800-53, keyword search rules were developed and used to map control items to capabilities in an automated manner.
[ 0.023742847, 0.05526157, 0.061955366, -0.0018212915, 0.0043503386, -0.02976978, -0.018596675, 0.0010765751, 0.059992522, 0.00028782067, 0.013525999, -0.010625773, 0.007555686, 0.00725371, 0.006599429, -0.042301774, 0.011412168, 0.02511432, 0.019074803, -0.0072285454, 0.042251...
2
According to Computer Security Division 2014 Annual Report: Federal agencies, industry, and the public rely on cryptography for the protection of information and communications used in electronic commerce, critical infrastructures, and other application areas. The STVMG supports the testing and validation of cryptographic modules and the cryptographic algorithms specified in NIST standards. These cryptographic modules and algorithms enable products and systems to provide security services, such as confidentiality, integrity authentication, and source authentication. Although cryptography provides security, poor designs or weak algorithms can render a product insecure and place highly sensitive information at risk. When protecting sensitive data, Federal Government agencies require a minimum level of assurance that cryptographic - Cloud computing security; - Supply-chain risk management; - Incident handling; - IT security evaluation and assurance; - Security assessment of operational systems; - Security requirements for cryptographic modules; - Protection profiles; - Role-based access control; - Security checklists; - Security metrics; - C ryptographic and non-cryptographic techniques and mechanisms, including confidentiality, entity authentication, non-repudiation, key management, data integrity, message authentication, hash functions, and digital signatures; - Future service and applications standards supporting the implementation of control objectives and controls as defined in ISO 27001, in the areas of business continuity, and outsourcing; - Identity management, including an identity management framework, role-based access control, and single sign-on; and - Privacy technologies, including a privacy framework, privacy reference architecture, privacy infrastructure, anonymity and credentials, and specific privacy-enhancing technologies. In the past year, NIST continued to support the EAC in finalizing changes to the Voluntary Voting System Guidelines (VVSG) 1.1.
[ -0.024859566, 0.016092602, 0.07590102, -0.012965322, 0.03300504, 0.029434783, 0.0009859529, 0.025930643, 0.004932244, -0.00026136427, 0.019781867, 0.016700868, -0.07029439, 0.0074380348, -0.0089785345, 0.01799674, -0.020363687, 0.01299838, -0.0146116065, -0.0021537244, 0.0261...
3
According to Information Security Guide for Government Executives: | Information Security Program Elements | Information Security Program Elements | |--------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Certification, Accreditation, and Security Assessments | Security certification and accreditation (C&A) are important activities that support a risk management process, and each is an integral part of an agency's information security program.
[ 0.009186239, 0.014103306, 0.05548766, 0.035171494, 0.044218898, 0.049610317, -0.0002677271, 0.0013905177, 0.01185881, 0.003913407, 0.032950137, -0.052016787, 0.00403778, -0.013756219, -0.014450394, 0.026170367, -0.00067320437, -0.0074739424, 0.00029195088, 0.020940922, -0.010...
4
According to Foundational Cybersecurity Activities for IoT Device Manufacturers: various forms such as frameworks, baselines, and best practices, just to name a few. 3. Which technical or non-technical means should the customer provide themselves or consider providing themselves? Examples would be using network-based security controls (e.g., a firewall) to prevent direct access to the device from the internet and performing audits of the implementation and devices settings to ensure compliance requirements are met. 4. How is each of the technical and non-technical means expected to affect cybersecurity risks? For example, proper implementation of data protection may help mitigate confidentiality risks, but may also reduce availability (e.g., if data cannot be decrypted or is decrypted slowly), which could increase availability risks.
[ -0.027961956, 0.016575625, 0.066348836, -0.0035705357, 0.05263427, -0.040448695, 0.020988842, -0.008716392, 0.02404682, 0.05652624, 0.024741814, 0.017826615, 0.0022355665, -0.037552882, -0.007187404, -0.03757605, -0.023004327, -0.0073321946, -0.020282263, 0.025506308, 0.03556...
5
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts, practices, and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST. The enhanced security requirements are organized into 14 families consistent with the families for basic and derived requirements. Each family contains the requirements related to the general security topic of the family. The families are closely aligned with the minimum security requirements for federal information and information systems in [FIPS 200]. The security requirements for contingency planning , system and services acquisition , and planning are not included within the scope of this publication due to the tailoring criteria in [SP 800-171]. Table 1 lists the security requirement families addressed in this publication. 17 - 3.11.4e Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination.
[ 0.012861675, 0.010412418, 0.06316374, -0.03475729, -0.0053477488, 0.012141667, 0.0073908474, 0.02577258, -0.04627741, -0.012738597, 0.015914014, -0.00617545, -0.019594053, 0.026757207, 0.002463103, -0.033994205, 0.028849537, -0.0025123344, -0.030966481, 0.025255652, 0.0226587...
6
According to Developing Cyber-Resilient Systems_ A Systems Security Engineering Approach: server are vulnerable to malware that has compromised the primary server. However, if an organization has already invested in backup services (in support of COOP or cybersecurity), those services can be enhanced by requiring an adversary to navigate multiple distinct defenses, authentication challenges (Calibrated Defense-in-Depth approach to Coordinated Protection), or some form of Synthetic Diversity to compensate for known attack vectors. The identification of the type of system begins with the identification of its general type (e.g., CPS,49 application, enterprise service, common infrastructure as part of EIT or LSPE, EIT as a whole, or LSPE as a whole). The type of system determines which cyber resiliency techniques and approaches are most relevant.50 Each type of system has an associated set of architectural patterns. For example, a CPS device typically includes a sensor, a controller (which is present in cyberspace), an actuator, and a physical layer. EIT typically includes enterprise services (e.g., identity and access management, mirroring and backup, email), common infrastructures (e.g., an internal communications network, a storage area network, a virtualization, or a cloud infrastructure), a demilitarized zone (DMZ) for interfacing with the Internet, and a collection of enterprise applications. The process of protecting information by preventing, detecting, and responding to attacks. Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
[ 0.0019875048, 0.021481326, 0.06181607, 0.022361312, 0.04113035, 0.006298537, 0.010174096, 0.03961147, -0.027556852, 0.05554767, 0.03770684, -0.03298143, 0.004475276, -0.026761247, -0.0156107275, -0.0026942068, 0.0093965735, 0.04489139, -0.01571922, -0.0065878476, 0.03826135, ...
7
According to 3rd High-Performance Computing Security Workshop_ Joint NIST-NSF Workshop Report: and future directions in HPC security. This public workshop report provides detailed summaries of technical sessions, key takeaways from breakout sessions, and a summary of the keynote presentations. | | Introduction: Workshop Objective, Participants, and Agenda.......................................1 | |---------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | Workshop Session Highlights and Summaries................................................................5 | | HPC | Architecture and Security Posture ........................................................................5 | | | HPC Operator Security Experience...............................................................................6 | | | Risk Management Framework Development, Implementation, and Assessment.........7 | | 2.3.1.
[ -0.007875781, -0.0053012455, 0.073490724, -0.002990685, 0.043975182, -0.007720501, -0.04983854, 0.021018647, 0.015664605, -0.016559016, 0.013788828, 0.010540379, -0.030757781, -0.032720517, 0.005524848, -0.014447213, 0.0083913095, 0.008546589, 0.01767703, 0.029565234, -0.0045...
8
"According to Guidelines on Mobile Device Forensics:\n\nciencedirect.com>. - [Kat10] Eric Katz, A(...TRUNCATED)
[0.009023905,0.040832847,0.03125541,0.00059577404,-0.0011585613,-0.011077133,-0.0076014493,-0.004592(...TRUNCATED)
9
End of preview. Expand in Data Studio

CMMC Training Dataset - Comprehensive Variant

Dataset Description

This is the Comprehensive variant of the CMMC (Cybersecurity Maturity Model Certification) training dataset, containing 11,279 high-quality training examples from the complete NIST CMMC publication library.

Dataset Characteristics

  • Total Examples: 11,279 (9,023 train / 2,256 validation)
  • Source Documents: 381 NIST publications
  • CMMC Levels Covered: Level 1, Level 2, Level 3
  • CMMC Domains: All 17 domains
  • Format: JSONL with chat-formatted messages
  • Embeddings: 1536-dimensional vectors (OpenAI text-embedding-3-small)
  • License: Public Domain (NIST documents are US Government works)

What Makes This "Comprehensive"?

The Comprehensive variant is the most complete CMMC training dataset available, including virtually every NIST publication relevant to CMMC compliance:

  • 381 source documents from the NIST CSRC library
  • 11,279 training examples covering all aspects of CMMC
  • Maximum context and coverage for exhaustive knowledge
  • Research-grade completeness for academic and enterprise use

Document Categories

Core Foundation (14 documents):

  • NIST SP 800-171 R3, 800-172 R3, 800-53 R5
  • Assessment procedures and implementation guides

Security Controls & Implementation (~120 documents):

  • Detailed guides for all 17 CMMC domains
  • Implementation examples and case studies
  • Assessment methodologies

Specialized Topics (~247 documents):

  • Cloud security (800-series)
  • IoT and mobile security
  • Supply chain risk management
  • Incident response and forensics
  • Cryptography and PKI
  • Privacy engineering
  • Security automation
  • Continuous monitoring
  • Vulnerability management
  • And much more...

CMMC Level Distribution

All Levels:         10,430 examples (92.5%)
Level 1 (Foundational): 392 examples (3.5%)
Level 2 (Advanced): 309 examples (2.7%)
Level 3 (Advanced):   148 examples (1.3%)

CMMC Domain Distribution

All 17 CMMC domains are comprehensively covered:

  • Access Control (AC): 2,042 examples
  • Awareness and Training (AT): 2,043 examples
  • Audit and Accountability (AU): 2,042 examples
  • Configuration Management (CM): 1,922 examples
  • Identification and Authentication (IA): 2,043 examples
  • Incident Response (IR): 2,042 examples
  • Maintenance (MA): 2,043 examples
  • Media Protection (MP): 2,043 examples
  • Personnel Security (PS): 2,043 examples
  • Physical Protection (PE): 2,043 examples
  • Planning (PL): 2,042 examples
  • Risk Assessment (RA): 2,043 examples
  • Security Assessment (CA): 2,043 examples
  • Supply Chain Risk Management (SR): 1,947 examples
  • System and Communications Protection (SC): 2,042 examples
  • System and Information Integrity (SI): 2,042 examples
  • System and Services Acquisition (SA): 2,042 examples

Note: Domain counts represent the number of examples tagged with each domain. Since examples can be tagged with multiple domains, the sum of domain counts exceeds the total number of examples (11,279).

Average: ~2,014 examples per domain (well-balanced)

Source Documents (381 total)

The Comprehensive variant includes:

FIPS Publications (~15 documents):

  • Cryptographic standards
  • Hashing and encryption algorithms
  • PKI and digital signatures

SP 800-Series Security Guides (~340 documents):

  • Core compliance (171, 172, 53)
  • Implementation guides
  • Risk management
  • Security controls
  • Assessment procedures
  • Specialized topics

Interagency Reports (IR) (~26 documents):

  • Research findings
  • Technical analysis
  • Emerging threats
  • Implementation case studies

This represents virtually the entire NIST CMMC-relevant catalog available as of 2025.

Dataset Structure

JSONL Training Files

Each example follows the chat format:

{
  "messages": [
    {
      "role": "system",
      "content": "You are a cybersecurity expert specializing in CMMC..."
    },
    {
      "role": "user",
      "content": "What are the cryptographic requirements for CMMC Level 3?"
    },
    {
      "role": "assistant",
      "content": "According to NIST SP 800-172 R3 and FIPS 140-3..."
    }
  ],
  "metadata": {
    "source": "NIST SP 800-172 R3",
    "cmmc_level": "3",
    "cmmc_domain": "System and Communications Protection",
    "type": "cmmc_requirement"
  }
}

Vector Embeddings

Pre-computed embeddings using OpenAI's text-embedding-3-small model:

  • Format: Parquet files with 1536-dimensional vectors
  • Files: embeddings_train.parquet, embeddings_valid.parquet
  • Size: ~140 MB total (estimated)
  • Cost: $0.03-0.05 (estimated 1.5-2.5M tokens)

FAISS Indexes

Ready-to-use vector similarity search indexes:

  • L2 distance indexes: faiss_train_l2.index, faiss_valid_l2.index
  • Cosine similarity indexes: faiss_train_cosine.index, faiss_valid_cosine.index

Q&A Generation Strategies

Examples were generated using 5 complementary strategies:

  1. Section-based Q&A: Questions from document sections
  2. Control-based Q&A: NIST control requirements (3.1.1 format)
  3. CMMC-specific Q&A: Level-focused questions (L1/L2/L3)
  4. Domain-specific Q&A: Questions per CMMC domain
  5. Semantic chunking: General content with context preservation

With weighted sampling: core documents (5x), balanced documents (3x), supplementary (2x).

Use Cases

The Comprehensive dataset is ideal for:

  • Enterprise-grade CMMC assistants: Maximum knowledge coverage
  • Research and development: Complete NIST CMMC corpus
  • Exhaustive RAG systems: Every relevant document included
  • Academic studies: Research-grade completeness
  • Specialized consulting: Coverage of niche/emerging topics
  • Long-term knowledge base: Future-proof comprehensive training

Dataset Statistics

Source Documents:         381
Total Examples:           11,279
Training Examples:        9,023 (80%)
Validation Examples:      2,256 (20%)
Avg Example Length:       ~234 tokens
Total Tokens Embedded:    2,639,168
Embedding Cost:           $0.05 USD
Domain Coverage:          Complete (all 17 domains)

Advantages Over Other Variants

vs. Core (14 docs, 1.2K examples):

  • 27x more source documents
  • 9x more training examples
  • Covers specialized/emerging topics not in core
  • Better for niche use cases and edge scenarios

vs. Balanced (71 docs, 2.8K examples):

  • 5x more source documents
  • 4x more training examples
  • Deeper coverage of each domain
  • Includes research reports and specialized guides
  • Better for exhaustive knowledge requirements

Trade-offs:

  • Longer training time (4x vs. Balanced)
  • Higher computational cost
  • May include redundant/overlapping content
  • Potential for overfitting on less-critical topics

When to Use Comprehensive

Choose Comprehensive if:

  • You need maximum coverage of CMMC topics
  • You're building an enterprise-grade knowledge system
  • You need coverage of specialized/emerging topics (IoT, cloud, supply chain)
  • Training time/cost is not a constraint
  • You want research-grade completeness
  • You're building a long-term knowledge base

Choose Balanced if:

  • You need good coverage but faster training
  • You want equal domain representation
  • You're resource-constrained
  • You need production-ready performance

Choose Core if:

  • You only need SP 800-171/172 fundamentals
  • You want fastest training possible
  • You're focused on core CMMC certification only

Example Topics Unique to Comprehensive

This variant includes specialized content not found in smaller datasets:

  • Cloud Security: NIST 800-series cloud guidance
  • IoT Security: Embedded systems and IoT frameworks
  • Supply Chain: Software supply chain security (SSDF, C-SCRM)
  • Privacy Engineering: NIST Privacy Framework integration
  • Quantum-Safe Crypto: Post-quantum cryptography guidance
  • Security Automation: SOAR and automation frameworks
  • Forensics: Digital forensics and incident investigation
  • Industrial Control Systems: ICS/SCADA security
  • Mobile Security: Mobile device management
  • Secure Development: SDLC and DevSecOps

Quick Start

Load JSONL Data

import json

# Load training data
with open('train.jsonl', 'r') as f:
    train_data = [json.loads(line) for line in f]

print(f"Total examples: {len(train_data)}")

# Example: Find all Level 3 examples
level3_examples = [
    ex for ex in train_data
    if ex.get('metadata', {}).get('cmmc_level') == '3'
]
print(f"Level 3 examples: {len(level3_examples)}")

Load Embeddings

import pandas as pd
import numpy as np

# Load embeddings
df = pd.read_parquet('embeddings_train.parquet')

# Access embeddings as numpy array
embeddings = np.vstack(df['embedding'].values)
texts = df['text'].tolist()

print(f"Embeddings shape: {embeddings.shape}")  # (9023, 1536)

Use FAISS Index for Semantic Search

import faiss
import numpy as np

# Load FAISS index
index = faiss.read_index('faiss_train_cosine.index')

# Search for similar content
query_embedding = ... # your query vector (1536-dim)
k = 10  # number of results
distances, indices = index.search(query_embedding.reshape(1, -1), k)

# Get similar texts with scores
for i, (idx, score) in enumerate(zip(indices[0], distances[0])):
    print(f"{i+1}. [Score: {score:.3f}] {texts[idx][:150]}...")

Related Datasets

This is part of a family of 3 CMMC datasets:

  • Core: 14 docs, 1.2K examples - Essential CMMC foundation
  • Balanced: 71 docs, 2.8K examples - Domain-balanced coverage
  • Comprehensive (this dataset): 381 docs, 11.3K examples - Complete NIST CMMC library

Citation

If you use this dataset, please cite:

@dataset{cmmc_comprehensive_2025,
  title={CMMC Training Dataset - Comprehensive Variant},
  author={Troy, Ethan Oliver},
  year={2025},
  publisher={HuggingFace},
  note={Derived from 381 NIST Special Publications (Public Domain)}
}

License

Public Domain - This dataset is derived from NIST Special Publications, which are works of the US Government and not subject to copyright protection in the United States.

Acknowledgments

This dataset is built from 381 publications by the National Institute of Standards and Technology (NIST), Computer Security Resource Center.

Special thanks to:

  • NIST CSRC for comprehensive cybersecurity documentation
  • The CMMC-AB for defining the certification framework
  • The open-source community for extraction and processing tools

Dataset Version

  • Version: 1.0
  • Created: 2025
  • Source: NIST CSRC Publications (381 documents)
  • Processing: Docling + custom CMMC-aware data preparation
  • Weighting: Core documents (5x), balanced (3x), supplementary (2x)

Performance Recommendations

For training with this large dataset:

  • Recommended batch size: 4-8 (depending on GPU memory)
  • Training iterations: 1000-2000 for good convergence
  • LoRA rank: 16-32 for capacity
  • Expected training time: 8-12 hours (7B model on M4 Max)
  • Memory required: 16GB+ for training, 64GB+ recommended

Contact

For questions or issues, please open an issue on the GitHub repository.

Downloads last month
61

Collection including ethanolivertroy/cmmc-training-comprehensive