Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

accreditation boundary

Abbreviations / Acronyms / Synonyms:

security perimeter
Security Perimeter

Definitions:

  All components of an information system to be accredited by an authorizing official and excludes separately accredited systems, to which the information system is connected. Synonymous with the term security perimeter defined in CNSS Instruction 4009 and DCID 6/3.
Sources:
NIST SP 800-18 Rev. 1 under Accreditation Boundary

  All components of an information system to be accredited by an authorizing official and excludes separately accredited systems to which the information system is connected. Synonymous with the term security perimeter defined in CNSS Instruction 4009 and DCID 6/3.
Sources:
NIST SP 800-60 Vol. 1 Rev. 1 under Accreditation Boundary
NIST SP 800-60 Vol. 2 Rev. 1 under Accreditation Boundary

  Product comprised of a system security plan (SSP) and a report documenting the basis for the accreditation decision. Rationale: The RMF uses a new term to refer to this concept, and it is called RMF security authorization package.
Sources:
CNSSI 4009-2015 under accreditation package

  A physical or logical boundary that is defined for a system, domain, or enclave; within which a particular security policy or security architecture is applied.
Sources:
CNSSI 4009-2015 under security perimeter

  See Accreditation Boundary.
Sources:
NIST SP 800-18 Rev. 1 under Security Perimeter

  Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging.
Sources:
CNSSI 4009-2015

  For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.
Sources:
CNSSI 4009-2015