Term:Boundary Protection
Contents
GAO-09-232G
Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels).
NIST IR 7298
Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization and information systems not completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels). SOURCE: SP 800-53 Rev 1
NIST SP 800-39 Draft 2
Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
NIST SP 800-53A
Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
NIST SP 800-53r1
Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
NIST SP 800-53r2
Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
NIST SP 800-53r3
Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).