Term:Boundary Protection

From FISMApedia
Revision as of 00:38, 27 October 2009 by DanPhilpott (talk) (1 revision)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

GAO-09-232G

Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels).

NIST IR 7298

Boundary Protection - Monitoring and control of communications at the external boundary between information systems completely under the management and control of the organization and information systems not completely under the management and control of the organization, and at key internal boundaries between information systems completely under the management and control of the organization, to prevent and detect malicious and other unauthorized communication, employing controlled interfaces (e.g., proxies, gateways, routers, firewalls, encrypted tunnels). SOURCE: SP 800-53 Rev 1

NIST SP 800-39 Draft 2

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53A

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r1

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r2

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).

NIST SP 800-53r3

Boundary Protection - Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of [[Term:boundary protection | boundary protection]] devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).