Under active development Content is continuously updated and improved

SC-7(21)Boundary Protection

Secret (P2)
Technical

>Control Description

BOUNDARY PROTECTION | ISOLATION OF INFORMATION SYSTEM COMPONENTS The organization employs boundary protection mechanisms to separate organization-defined information system components supporting organization-defined missions and/or business functions.

>Supplemental Guidance

Organizations can isolate information system components performing different missions and/or business functions. Such isolation limits unauthorized information flows among system components and also provides the opportunity to deploy greater levels of protection for selected components. Separating system components with boundary protection mechanisms provides the capability for increased protection of individual components and to more effectively control information flows between those components.

This type of enhanced protection limits the potential harm from cyber-attacks and errors. The degree of separation provided varies depending upon the mechanisms chosen. Boundary protection mechanisms include, for example, routers, gateways, and firewalls separating system components into physically separate networks or sub-networks, cross-domain devices separating sub-networks, virtualization techniques, and encrypting information flows among system components using distinct encryption keys.

Related controls: CA-9, SC-3.

Ask AI

Configure your API key to use AI features.