In the case of the operating system, the boundary may be the workstation on the public internet. In order to thwart an attack the operating system must be able to ensure communications are coming from an authorized source and routed to an authorized destination. Applicable, but permanent not-a-finding - Host isolation on a separate, non-routed, management network is required. Not a router, however a requirement already exists for a gateway setting. Management network/traffic isolation, and firewall requirements already exist. |