Title
HOST-BASED PROTECTION
Description
The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].
Supplemental
Host-based boundary protection mechanisms include, for example, host-based firewalls. Information system components employing host-based boundary protection mechanisms include, for example, servers, workstations, and mobile devices.
Reference Item Details
Category: SYSTEM AND COMMUNICATIONS PROTECTION
Parent Title: BOUNDARY PROTECTION
Family: SYSTEM AND COMMUNICATIONS PROTECTION