X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 42 / 158

374 views

0 shares

0 downloads

0 comments

42 / 158

U.S. Department of Health and Human Services

The process of uniquely assigning information resources (IT systems, personnel, funding, equipment) to an information system defines the security boundary for that system. All IT resources at HHS must be included within some system boundary.

System boundaries at HHS meet these general considerations:

Elements have the same function or mission objective and essentially the same operating characteristics and security needs

Resources are under the same direct management controls

Elements reside in the same general operating environment (or in the case of a distributed information system, reside in various locations with similar operating environments)

Page 1 of 2

Identifying Boundaries

Importance, Impact and Purpose

Document info
Document views374
Page views374
Page last viewedSun Dec 04 22:00:26 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments