Term:Boundary Protection

From FISMApedia
Jump to: navigation, search

GAO-09-232G

Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels).

NIST IR 7298

Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization and information systems not completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels). SOURCE: SP 800-53 Rev 1

NIST SP 800-39 Draft 2

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53A

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r1

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r2

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r3

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).