Enclave boundary defense at the alternate site must be configured identically to that of the primary site.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACI | High | Continuity |
Threat |
---|
A securely configured enclave boundary is essential to the maintaining the integrity of a site’s IT systems. Ensuring the identical configuration of an alternate site assures integrity of operations in the wake of an incident requiring the switch of mission operations to the alternate site. |
Guidance |
---|
Enclave boundary defense at the alternate site shall be configured identically to that of the primary site. |