Boundary Protection

February 9, 2018

How Can We Help?

Boundary Protection

You are here:
< Back

Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
SOURCE: SP 800-53; CNSSI-4009