Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center


A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Accreditation Boundary (C.F.D.)




  All components of an information system to be accredited by an authorizing official and excludes separately accredited systems to which the information system is connected. Synonymous with the term security perimeter defined in CNSS Instruction 4009 and DCID 6/3.
Source(s): NIST SP 800-60 Vol 1 Rev. 1 (NIST SP 800-37)

  For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.
Source(s): CNSSI 4009-2015

  Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging.
Source(s): CNSSI 4009-2015

Security Perimeter
  A physical or logical boundary that is defined for a system, domain, or enclave; within which a particular security policy or security architecture is applied.
Source(s): CNSSI 4009-2015
See Also: