Enclave boundary defense at the alternate site must be configured identically to that of the primary site.
|MAC / CONF||Impact||Subject Area|
|A securely configured enclave boundary is essential to the maintaining the integrity of a site’s IT systems. Ensuring the identical configuration of an alternate site assures integrity of operations in the wake of an incident requiring the switch of mission operations to the alternate site.|
|Enclave boundary defense at the alternate site shall be configured identically to that of the primary site.|