X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 42 / 158

595 views

0 shares

0 downloads

0 comments

42 / 158

U.S. Department of Health and Human Services

The process of uniquely assigning information resources (IT systems, personnel, funding, equipment) to an information system defines the security boundary for that system. All IT resources at HHS must be included within some system boundary.

System boundaries at HHS meet these general considerations:

Elements have the same function or mission objective and essentially the same operating characteristics and security needs

Resources are under the same direct management controls

Elements reside in the same general operating environment (or in the case of a distributed information system, reside in various locations with similar operating environments)

Page 1 of 2

Identifying Boundaries

Importance, Impact and Purpose

Document info
Document views595
Page views595
Page last viewedSun Jan 22 12:18:56 UTC 2017
Pages158
Paragraphs2058
Words16945

Comments