SC-7(12)—Boundary Protection
PBMM (P2)
Secret (P2)
Technical
>Control Description
BOUNDARY PROTECTION | HOST-BASED PROTECTION The organization implements ⚙organization-defined host-based boundary protection mechanisms at ⚙organization-defined information system components.
>Supplemental Guidance
Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.