Term:Boundary Protection Device
Contents
NIST SP 800-39 Draft 2
Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.
NIST SP 800-53A
Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.
NIST SP 800-53r1
Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.
NIST SP 800-53r2
Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.
NIST SP 800-53r3
Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system [[Term:boundary protection | boundary protection]].