Under active development Content is continuously updated and improved

SC-7(12)Boundary Protection

PBMM (P2)
Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | HOST-BASED PROTECTION The organization implements organization-defined host-based boundary protection mechanisms at organization-defined information system components.

>Supplemental Guidance

Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

Ask AI

Configure your API key to use AI features.