Datasets:
text stringlengths 46 9.2k | embedding listlengths 1.54k 1.54k | example_idx int64 0 9.02k |
|---|---|---|
According to Security Strategies for Microservices-based Application Systems:
3.2.1 Service Discovery Mechanism Threats
The basic functions in a service discovery mechanism are:
- Service registration and de-registration. | [
-0.049240943,
0.037581105,
0.061965067,
-0.02159317,
-0.015999759,
0.027931582,
-0.037131738,
-0.01001611,
-0.014947299,
0.0011877131,
0.01466349,
-0.07114158,
0.027174758,
-0.008449244,
-0.016188966,
0.013729284,
-0.030083803,
0.03145555,
-0.0030036503,
0.009146943,
0.054633... | 0 |
According to Guidelines on Active Content and Mobile Code:
| Executive Summary..............................................................................................................ES-1 | Executive Summary..............................................................................................................ES-1 | Executive Summary..............................................................................................................ES-1 |
|---------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| 1. | [
0.04985571,
0.048138488,
0.0064818054,
0.004359911,
0.024618192,
-0.009071712,
-0.020747406,
-0.05523258,
0.02045182,
0.019748041,
0.037919614,
-0.03943978,
0.0101273805,
0.0013327816,
0.0050179446,
0.017833762,
0.0029998582,
-0.010331477,
0.030853674,
0.036962476,
0.03105073... | 1 |
According to Automation Support for Security Control Assessments_ Volume 1_ Overview:
3.5.2 Tracing Security Control Items to Capabilities... 3.5.2 Tracing Security Control Items to Capabilities), sub-capabilities were derived to more fully demonstrate how the HWAM controls work together to achieve the purposes of HWAM (see 3. 3.5.2 Tracing Security Control Items to Capabilities
In defining individual security control items from SP 800-53, keyword search rules were developed and used to map control items to capabilities in an automated manner. | [
0.023742847,
0.05526157,
0.061955366,
-0.0018212915,
0.0043503386,
-0.02976978,
-0.018596675,
0.0010765751,
0.059992522,
0.00028782067,
0.013525999,
-0.010625773,
0.007555686,
0.00725371,
0.006599429,
-0.042301774,
0.011412168,
0.02511432,
0.019074803,
-0.0072285454,
0.042251... | 2 |
According to Computer Security Division 2014 Annual Report:
Federal agencies, industry, and the public rely on cryptography for the protection of information and communications used in electronic commerce, critical infrastructures, and other application areas. The STVMG supports the testing and validation of cryptographic modules and the cryptographic algorithms specified in NIST standards. These cryptographic modules and algorithms enable products and systems to provide security services, such as confidentiality, integrity authentication, and source authentication. Although cryptography provides security, poor designs or weak algorithms can render a product insecure and place highly sensitive information at risk. When protecting sensitive data, Federal Government agencies require a minimum level of assurance that cryptographic
- Cloud computing security;
- Supply-chain risk management;
- Incident handling;
- IT security evaluation and assurance;
- Security assessment of operational systems;
- Security requirements for cryptographic modules;
- Protection profiles;
- Role-based access control;
- Security checklists;
- Security metrics;
- C ryptographic and non-cryptographic techniques and mechanisms, including confidentiality, entity authentication, non-repudiation, key management, data integrity, message authentication, hash functions, and digital signatures;
- Future service and applications standards supporting the implementation of control objectives and controls as defined in ISO 27001, in the areas of business continuity, and outsourcing;
- Identity management, including an identity management framework, role-based access control, and single sign-on; and
- Privacy technologies, including a privacy framework, privacy reference architecture, privacy infrastructure, anonymity and credentials, and specific privacy-enhancing technologies. In the past year, NIST continued to support the EAC in finalizing changes to the Voluntary Voting System Guidelines (VVSG) 1.1. | [
-0.024859566,
0.016092602,
0.07590102,
-0.012965322,
0.03300504,
0.029434783,
0.0009859529,
0.025930643,
0.004932244,
-0.00026136427,
0.019781867,
0.016700868,
-0.07029439,
0.0074380348,
-0.0089785345,
0.01799674,
-0.020363687,
0.01299838,
-0.0146116065,
-0.0021537244,
0.0261... | 3 |
According to Information Security Guide for Government Executives:
| Information Security Program Elements | Information Security Program Elements | |--------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Certification, Accreditation, and Security Assessments | Security certification and accreditation (C&A) are important activities that support a risk management process, and each is an integral part of an agency's information security program. | [
0.009186239,
0.014103306,
0.05548766,
0.035171494,
0.044218898,
0.049610317,
-0.0002677271,
0.0013905177,
0.01185881,
0.003913407,
0.032950137,
-0.052016787,
0.00403778,
-0.013756219,
-0.014450394,
0.026170367,
-0.00067320437,
-0.0074739424,
0.00029195088,
0.020940922,
-0.010... | 4 |
According to Foundational Cybersecurity Activities for IoT Device Manufacturers:
various forms such as frameworks, baselines, and best practices, just to name a few. 3. Which technical or non-technical means should the customer provide themselves or consider providing themselves?
Examples would be using network-based security controls (e.g., a firewall) to prevent direct access to the device from the internet and performing audits of the implementation and devices settings to ensure compliance requirements are met. 4. How is each of the technical and non-technical means expected to affect cybersecurity risks? For example, proper implementation of data protection may help mitigate confidentiality risks, but may also reduce availability (e.g., if data cannot be decrypted or is decrypted slowly), which could increase availability risks. | [
-0.027961956,
0.016575625,
0.066348836,
-0.0035705357,
0.05263427,
-0.040448695,
0.020988842,
-0.008716392,
0.02404682,
0.05652624,
0.024741814,
0.017826615,
0.0022355665,
-0.037552882,
-0.007187404,
-0.03757605,
-0.023004327,
-0.0073321946,
-0.020282263,
0.025506308,
0.03556... | 5 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts, practices, and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST.
The enhanced security requirements are organized into 14 families consistent with the families for basic and derived requirements. Each family contains the requirements related to the general security topic of the family. The families are closely aligned with the minimum security requirements for federal information and information systems in [FIPS 200]. The security requirements for contingency planning , system and services acquisition , and planning are not included within the scope of this publication due to the tailoring criteria in [SP 800-171]. Table 1 lists the security requirement families addressed in this publication. 17
- 3.11.4e Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination. | [
0.012861675,
0.010412418,
0.06316374,
-0.03475729,
-0.0053477488,
0.012141667,
0.0073908474,
0.02577258,
-0.04627741,
-0.012738597,
0.015914014,
-0.00617545,
-0.019594053,
0.026757207,
0.002463103,
-0.033994205,
0.028849537,
-0.0025123344,
-0.030966481,
0.025255652,
0.0226587... | 6 |
According to Developing Cyber-Resilient Systems_ A Systems Security Engineering Approach:
server are vulnerable to malware that has compromised the primary server. However, if an
organization has already invested in backup services (in support of COOP or cybersecurity),
those services can be enhanced by requiring an adversary to navigate multiple distinct defenses,
authentication challenges (Calibrated Defense-in-Depth approach to Coordinated Protection), or
some form of Synthetic Diversity to compensate for known attack vectors.
The identification of the type of system begins with the identification of its general type (e.g.,
CPS,49 application, enterprise service, common infrastructure as part of EIT or LSPE, EIT as a
whole, or LSPE as a whole). The type of system determines which cyber resiliency techniques
and approaches are most relevant.50 Each type of system has an associated set of architectural
patterns. For example, a CPS device typically includes a sensor, a controller (which is present in
cyberspace), an actuator, and a physical layer. EIT typically includes enterprise services (e.g.,
identity and access management, mirroring and backup, email), common infrastructures (e.g.,
an internal communications network, a storage area network, a virtualization, or a cloud
infrastructure), a demilitarized zone (DMZ) for interfacing with the Internet, and a collection of
enterprise applications.
The process of protecting information by preventing, detecting,
and responding to attacks.
Prevention of damage to, protection of, and restoration of
computers, electronic communications systems, electronic
communications services, wire communication, and electronic
communication, including information contained therein, to
ensure its availability, integrity, authentication, confidentiality,
and nonrepudiation. | [
0.0019875048,
0.021481326,
0.06181607,
0.022361312,
0.04113035,
0.006298537,
0.010174096,
0.03961147,
-0.027556852,
0.05554767,
0.03770684,
-0.03298143,
0.004475276,
-0.026761247,
-0.0156107275,
-0.0026942068,
0.0093965735,
0.04489139,
-0.01571922,
-0.0065878476,
0.03826135,
... | 7 |
According to 3rd High-Performance Computing Security Workshop_ Joint NIST-NSF Workshop Report:
and future directions in HPC security. This public workshop report provides detailed summaries of technical sessions, key takeaways from breakout sessions, and a summary of the keynote presentations.
| | Introduction: Workshop Objective, Participants, and Agenda.......................................1 |
|---------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| | Workshop Session Highlights and Summaries................................................................5 |
| HPC | Architecture and Security Posture ........................................................................5 |
| | HPC Operator Security Experience...............................................................................6 |
| | Risk Management Framework Development, Implementation, and Assessment.........7 |
| 2.3.1. | [
-0.007875781,
-0.0053012455,
0.073490724,
-0.002990685,
0.043975182,
-0.007720501,
-0.04983854,
0.021018647,
0.015664605,
-0.016559016,
0.013788828,
0.010540379,
-0.030757781,
-0.032720517,
0.005524848,
-0.014447213,
0.0083913095,
0.008546589,
0.01767703,
0.029565234,
-0.0045... | 8 |
"According to Guidelines on Mobile Device Forensics:\n\nciencedirect.com>. - [Kat10] Eric Katz, A(...TRUNCATED) | [0.009023905,0.040832847,0.03125541,0.00059577404,-0.0011585613,-0.011077133,-0.0076014493,-0.004592(...TRUNCATED) | 9 |
CMMC Training Dataset - Comprehensive Variant
Dataset Description
This is the Comprehensive variant of the CMMC (Cybersecurity Maturity Model Certification) training dataset, containing 11,279 high-quality training examples from the complete NIST CMMC publication library.
Dataset Characteristics
- Total Examples: 11,279 (9,023 train / 2,256 validation)
- Source Documents: 381 NIST publications
- CMMC Levels Covered: Level 1, Level 2, Level 3
- CMMC Domains: All 17 domains
- Format: JSONL with chat-formatted messages
- Embeddings: 1536-dimensional vectors (OpenAI text-embedding-3-small)
- License: Public Domain (NIST documents are US Government works)
What Makes This "Comprehensive"?
The Comprehensive variant is the most complete CMMC training dataset available, including virtually every NIST publication relevant to CMMC compliance:
- 381 source documents from the NIST CSRC library
- 11,279 training examples covering all aspects of CMMC
- Maximum context and coverage for exhaustive knowledge
- Research-grade completeness for academic and enterprise use
Document Categories
Core Foundation (14 documents):
- NIST SP 800-171 R3, 800-172 R3, 800-53 R5
- Assessment procedures and implementation guides
Security Controls & Implementation (~120 documents):
- Detailed guides for all 17 CMMC domains
- Implementation examples and case studies
- Assessment methodologies
Specialized Topics (~247 documents):
- Cloud security (800-series)
- IoT and mobile security
- Supply chain risk management
- Incident response and forensics
- Cryptography and PKI
- Privacy engineering
- Security automation
- Continuous monitoring
- Vulnerability management
- And much more...
CMMC Level Distribution
All Levels: 10,430 examples (92.5%)
Level 1 (Foundational): 392 examples (3.5%)
Level 2 (Advanced): 309 examples (2.7%)
Level 3 (Advanced): 148 examples (1.3%)
CMMC Domain Distribution
All 17 CMMC domains are comprehensively covered:
- Access Control (AC): 2,042 examples
- Awareness and Training (AT): 2,043 examples
- Audit and Accountability (AU): 2,042 examples
- Configuration Management (CM): 1,922 examples
- Identification and Authentication (IA): 2,043 examples
- Incident Response (IR): 2,042 examples
- Maintenance (MA): 2,043 examples
- Media Protection (MP): 2,043 examples
- Personnel Security (PS): 2,043 examples
- Physical Protection (PE): 2,043 examples
- Planning (PL): 2,042 examples
- Risk Assessment (RA): 2,043 examples
- Security Assessment (CA): 2,043 examples
- Supply Chain Risk Management (SR): 1,947 examples
- System and Communications Protection (SC): 2,042 examples
- System and Information Integrity (SI): 2,042 examples
- System and Services Acquisition (SA): 2,042 examples
Note: Domain counts represent the number of examples tagged with each domain. Since examples can be tagged with multiple domains, the sum of domain counts exceeds the total number of examples (11,279).
Average: ~2,014 examples per domain (well-balanced)
Source Documents (381 total)
The Comprehensive variant includes:
FIPS Publications (~15 documents):
- Cryptographic standards
- Hashing and encryption algorithms
- PKI and digital signatures
SP 800-Series Security Guides (~340 documents):
- Core compliance (171, 172, 53)
- Implementation guides
- Risk management
- Security controls
- Assessment procedures
- Specialized topics
Interagency Reports (IR) (~26 documents):
- Research findings
- Technical analysis
- Emerging threats
- Implementation case studies
This represents virtually the entire NIST CMMC-relevant catalog available as of 2025.
Dataset Structure
JSONL Training Files
Each example follows the chat format:
{
"messages": [
{
"role": "system",
"content": "You are a cybersecurity expert specializing in CMMC..."
},
{
"role": "user",
"content": "What are the cryptographic requirements for CMMC Level 3?"
},
{
"role": "assistant",
"content": "According to NIST SP 800-172 R3 and FIPS 140-3..."
}
],
"metadata": {
"source": "NIST SP 800-172 R3",
"cmmc_level": "3",
"cmmc_domain": "System and Communications Protection",
"type": "cmmc_requirement"
}
}
Vector Embeddings
Pre-computed embeddings using OpenAI's text-embedding-3-small model:
- Format: Parquet files with 1536-dimensional vectors
- Files:
embeddings_train.parquet,embeddings_valid.parquet - Size: ~140 MB total (estimated)
- Cost: $0.03-0.05 (estimated 1.5-2.5M tokens)
FAISS Indexes
Ready-to-use vector similarity search indexes:
- L2 distance indexes:
faiss_train_l2.index,faiss_valid_l2.index - Cosine similarity indexes:
faiss_train_cosine.index,faiss_valid_cosine.index
Q&A Generation Strategies
Examples were generated using 5 complementary strategies:
- Section-based Q&A: Questions from document sections
- Control-based Q&A: NIST control requirements (3.1.1 format)
- CMMC-specific Q&A: Level-focused questions (L1/L2/L3)
- Domain-specific Q&A: Questions per CMMC domain
- Semantic chunking: General content with context preservation
With weighted sampling: core documents (5x), balanced documents (3x), supplementary (2x).
Use Cases
The Comprehensive dataset is ideal for:
- Enterprise-grade CMMC assistants: Maximum knowledge coverage
- Research and development: Complete NIST CMMC corpus
- Exhaustive RAG systems: Every relevant document included
- Academic studies: Research-grade completeness
- Specialized consulting: Coverage of niche/emerging topics
- Long-term knowledge base: Future-proof comprehensive training
Dataset Statistics
Source Documents: 381
Total Examples: 11,279
Training Examples: 9,023 (80%)
Validation Examples: 2,256 (20%)
Avg Example Length: ~234 tokens
Total Tokens Embedded: 2,639,168
Embedding Cost: $0.05 USD
Domain Coverage: Complete (all 17 domains)
Advantages Over Other Variants
vs. Core (14 docs, 1.2K examples):
- 27x more source documents
- 9x more training examples
- Covers specialized/emerging topics not in core
- Better for niche use cases and edge scenarios
vs. Balanced (71 docs, 2.8K examples):
- 5x more source documents
- 4x more training examples
- Deeper coverage of each domain
- Includes research reports and specialized guides
- Better for exhaustive knowledge requirements
Trade-offs:
- Longer training time (4x vs. Balanced)
- Higher computational cost
- May include redundant/overlapping content
- Potential for overfitting on less-critical topics
When to Use Comprehensive
Choose Comprehensive if:
- You need maximum coverage of CMMC topics
- You're building an enterprise-grade knowledge system
- You need coverage of specialized/emerging topics (IoT, cloud, supply chain)
- Training time/cost is not a constraint
- You want research-grade completeness
- You're building a long-term knowledge base
Choose Balanced if:
- You need good coverage but faster training
- You want equal domain representation
- You're resource-constrained
- You need production-ready performance
Choose Core if:
- You only need SP 800-171/172 fundamentals
- You want fastest training possible
- You're focused on core CMMC certification only
Example Topics Unique to Comprehensive
This variant includes specialized content not found in smaller datasets:
- Cloud Security: NIST 800-series cloud guidance
- IoT Security: Embedded systems and IoT frameworks
- Supply Chain: Software supply chain security (SSDF, C-SCRM)
- Privacy Engineering: NIST Privacy Framework integration
- Quantum-Safe Crypto: Post-quantum cryptography guidance
- Security Automation: SOAR and automation frameworks
- Forensics: Digital forensics and incident investigation
- Industrial Control Systems: ICS/SCADA security
- Mobile Security: Mobile device management
- Secure Development: SDLC and DevSecOps
Quick Start
Load JSONL Data
import json
# Load training data
with open('train.jsonl', 'r') as f:
train_data = [json.loads(line) for line in f]
print(f"Total examples: {len(train_data)}")
# Example: Find all Level 3 examples
level3_examples = [
ex for ex in train_data
if ex.get('metadata', {}).get('cmmc_level') == '3'
]
print(f"Level 3 examples: {len(level3_examples)}")
Load Embeddings
import pandas as pd
import numpy as np
# Load embeddings
df = pd.read_parquet('embeddings_train.parquet')
# Access embeddings as numpy array
embeddings = np.vstack(df['embedding'].values)
texts = df['text'].tolist()
print(f"Embeddings shape: {embeddings.shape}") # (9023, 1536)
Use FAISS Index for Semantic Search
import faiss
import numpy as np
# Load FAISS index
index = faiss.read_index('faiss_train_cosine.index')
# Search for similar content
query_embedding = ... # your query vector (1536-dim)
k = 10 # number of results
distances, indices = index.search(query_embedding.reshape(1, -1), k)
# Get similar texts with scores
for i, (idx, score) in enumerate(zip(indices[0], distances[0])):
print(f"{i+1}. [Score: {score:.3f}] {texts[idx][:150]}...")
Related Datasets
This is part of a family of 3 CMMC datasets:
- Core: 14 docs, 1.2K examples - Essential CMMC foundation
- Balanced: 71 docs, 2.8K examples - Domain-balanced coverage
- Comprehensive (this dataset): 381 docs, 11.3K examples - Complete NIST CMMC library
Citation
If you use this dataset, please cite:
@dataset{cmmc_comprehensive_2025,
title={CMMC Training Dataset - Comprehensive Variant},
author={Troy, Ethan Oliver},
year={2025},
publisher={HuggingFace},
note={Derived from 381 NIST Special Publications (Public Domain)}
}
License
Public Domain - This dataset is derived from NIST Special Publications, which are works of the US Government and not subject to copyright protection in the United States.
Acknowledgments
This dataset is built from 381 publications by the National Institute of Standards and Technology (NIST), Computer Security Resource Center.
Special thanks to:
- NIST CSRC for comprehensive cybersecurity documentation
- The CMMC-AB for defining the certification framework
- The open-source community for extraction and processing tools
Dataset Version
- Version: 1.0
- Created: 2025
- Source: NIST CSRC Publications (381 documents)
- Processing: Docling + custom CMMC-aware data preparation
- Weighting: Core documents (5x), balanced (3x), supplementary (2x)
Performance Recommendations
For training with this large dataset:
- Recommended batch size: 4-8 (depending on GPU memory)
- Training iterations: 1000-2000 for good convergence
- LoRA rank: 16-32 for capacity
- Expected training time: 8-12 hours (7B model on M4 Max)
- Memory required: 16GB+ for training, 64GB+ recommended
Contact
For questions or issues, please open an issue on the GitHub repository.
- Downloads last month
- 61