Enclave boundary defense at the alternate site provides security measures equivalent to the primary site.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACII MACIII | Medium | Continuity |
Threat |
---|
A securely configured enclave boundary is essential to the maintaining the integrity of a site’s IT systems. Ensuring that an alternate site provides boundary security equivalent to the primary site assures integrity of operations in the wake of an incident requiring the switch of mission operations to the alternate site. |
Guidance |
---|
Enclave boundary defense at the alternate site shall provide security measures equivalent to the primary site. |