The knowledge base uses many acronyms and abbreviations in the construction of identifiers for environment statements. They are pretty much all listed below.
| Abbreviation | Meaning | 
| A. | General Assumption | 
| Ac., AC. | Assumption Category | 
| AC | Access Control | 
| Acc, Acs | Access | 
| Acct, Account | Accountability | 
| Acnts | Accounts | 
| Act | Activity | 
| Adm, Admin | Administrator | 
| Agg | Aggregate | 
| Agnst | Against | 
| AIS | Automated Information System | 
| Assur | Assurance | 
| Atk | Attack | 
| Att, Attr | Attribute | 
| Aud | Audit | 
| Auth, Authentic | Authentication, Authorization | 
| Avl | Availability | 
| Buff | Buffer | 
| Chsn | Chosen | 
| Clr | Clear | 
| Cntd | Continued | 
| Col | Collect | 
| Comm | Communication | 
| Comp | Component | 
| Conf, Cnf | Confidentiality | 
| Config | Configuration | 
| Coop | Cooperative | 
| Cor | Corruption | 
| Crypto | Cryptographic | 
| Ctrl | Control | 
| Cy | Cipher | 
| Da., DA. | Detailed Attack | 
| DataAps | Data or Applications | 
| Dect | Detection | 
| Dev, Devr | Develop | 
| Disp | Display | 
| DKOR | Domain Knowledge Observation Report | 
| Doc, Docs | Documentation | 
| DOD | Department of Defense | 
| DoS | Denial of service | 
| Downld | Download | 
| Dp., DP. | Detailed Policy | 
| DS | Distributed System | 
| Dsgn | Design | 
| Dstr | Destruction | 
| EAL | Evaluated Assurance Level | 
| Eaves | Eavesdropping | 
| Eman | Emanate | 
| EMSEC | Emanations security | 
| Eng | Engineering | 
| Env | Environment | 
| Err | Error | 
| Exam | Examine | 
| Exch | Exchange | 
| Exe | Execute | 
| Exhst | Exhaustion | 
| Exp | Export | 
| Ext, Extern | External | 
| FC | Flawed Code | 
| Func | Function | 
| FW | Firmware | 
| Gen | Generation | 
| Hack | Hacker (hostile outsider) | 
| Hi | Hijacker | 
| Hstl | Hostile | 
| HW | Hardware | 
| I&A | Identification and Authentication | 
| I/O | Input / Output | 
| ID, Ident | Identification | 
| IF | Interface | 
| IFC | Information Flow Control | 
| Imp | Import | 
| Impl | Implementation | 
| Inf, Info | Information | 
| Int | Internal | 
| Integ | Integrity | 
| Intel | Intelligible | 
| Interfer | Interference | 
| Interp | Interpretation | 
| Intrc | Intercept | 
| ISO | International Standards Organization | 
| IT | Information Technology | 
| Loc | Local | 
| Maint | Maintenance | 
| Mal | Malicious | 
| Man, Mng | Manage, Management | 
| Mark | Marking | 
| Masq | Masquerade | 
| Med | Hacker | 
| Mgt | Management | 
| Misconfig | Misconfigure | 
| Mod | Modification | 
| Msg, Msng | Message | 
| MsgHdr | Message Header | 
| MsgMod | Message Modification | 
| Mult | Multiple | 
| NIAP | National Information Assurance Partnership | 
| NIST | National Institute of Standards and Technology | 
| NSA | National Security Agency | 
| O., Obj | Objective | 
| Obst | Obstruct | 
| Om | Omission | 
| Oper | Operation | 
| Out | Outside, Outsider | 
| Ovld | Overload | 
| Ovrwrit | Overwritten | 
| P. | General Policy | 
| PAA | Profile Author's Assistant | 
| Parm | Parameter | 
| Pc., PC. | Policy Category | 
| Phys | Physical | 
| Plcy | Policy | 
| Pln | Plain, Plaintext | 
| PP | Protection Profile | 
| Prcsr | Processor | 
| Pres | Presentation | 
| Priv, Prvlg | Privileged | 
| Procs | Procedures | 
| Prot | Protect | 
| Prvnt | Prevent | 
| Pwr | Power | 
| Rcv | Receive | 
| Rcvd | Received | 
| Rcvr | Receiver | 
| Recd | Received | 
| Recov | Recover | 
| Rem | Remote | 
| Rep | Replication | 
| Reqs | Requirements | 
| Res, Resc | Resource | 
| Resid | Residual | 
| Sec | Security | 
| Slf | Self | 
| Snd | Send | 
| Snt | Sent | 
| Soc | Social | 
| SP | Self-protection | 
| SQL | Sequel Query Language | 
| SRI | Stanford Research Institute | 
| ST | Security Target | 
| Steg, Sten | Steganography | 
| Stg | Storage | 
| Subj | Subject | 
| SW | Software | 
| Sys | System | 
| T. | General Threat | 
| Tc., TC. | Threat Category | 
| TCB | Trusted Computing Base (obsolescent) | 
| TOE | Target of Evaluation | 
| Trans | Transfer | 
| TSC | TOE Scope of Control | 
| TSF | TOE Security Functions | 
| TSFI | TSF Interface | 
| TSP | TOE Security Policy | 
| TOE | Target of Evaluation | 
| Txt | Text | 
| Uloc | User (local) | 
| Unauth | Unauthorized | 
| Urem | User (remote) | 
| USB | User-Subject Binding | 
| Usr | User | 
| Uwkstn | User Workstation | 
| Val | Validation | 
| Vul | Vulnerability | 
| Wauth | Weak Authentication | 
| Xpt | Export |