Jump to content

Capability, Boundary Management: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{LanguageHeader|en}}
{{LanguageHeader|en}}
{{CyberTerm|definition=An ISCM capability that addresses the following network and physical boundary areas: Physical Boundaries – Ensure that movement (of people, media, equipment, etc.) into and out of the physical facility does not compromise security. Filters – Ensure that traffic into and out of the network (and thus out of the physical facility protection) does not compromise security. Do the same for enclaves that subdivide the network. Other – Ensure that information is protected (with adequate strength) when needed to protect confidentiality and integrity, whether that information is in transit or at rest.|source=NISTIR 8011 Vol. 1}}
{{CyberTerm|definition=An ISCM capability that addresses the following network and physical boundary areas:  
Physical Boundaries – Ensure that movement (of people, media, equipment, etc.) into and out of the physical facility does not compromise security.  
Filters – Ensure that traffic into and out of the network (and thus out of the physical facility protection) does not compromise security. Do the same for enclaves that subdivide the network.  
Other – Ensure that information is protected (with adequate strength) when needed to protect confidentiality and integrity, whether that information is in transit or at rest.|source=NISTIR 8011 Vol. 1}}

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Capability, Boundary Management

An ISCM capability that addresses the following network and physical boundary areas: Physical Boundaries – Ensure that movement (of people, media, equipment, etc.) into and out of the physical facility does not compromise security. Filters – Ensure that traffic into and out of the network (and thus out of the physical facility protection) does not compromise security. Do the same for enclaves that subdivide the network. Other – Ensure that information is protected (with adequate strength) when needed to protect confidentiality and integrity, whether that information is in transit or at rest.


Source: NISTIR 8011 Vol. 1 | Category: