home/glossary/boundary protection device

boundary protection device

nounid 1701·updated May 12, 2026
candidate

A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system boundary protection.

polysemousMWE

Classifications

Entity Type

Network0%rule-basedmulti_axis_classifier_low_confidence.v1

Sensitivity

Regulated85%llm-generatedllm:claude-haiku-4-5

Information Class

90%llm-generatedllm:claude-haiku-4-5

Variants

synonym
network boundary device
plural
boundary protection devices
possessive
boundary protection device's
pluralpossessive
boundary protection devices'

Framework definitions

FFIEC Cybersecurity Assessment Tool, Baseline, May 20171 senseview framework →
§1
A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system boundary protection.
NISTIR 7298: Glossary of Key Information Security Terms, Revision 22 sensesview framework →
§1
A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system boundary protection.
§2 · sense_2_pending_review
A device with appropriate mechanisms that facilitates the adjudication of different security policies for interconnected systems.
CNSSI-4009 (Glossary of Information Assurance Terms)1 senseview framework →
§1
A device with appropriate mechanisms that facilitates the adjudication of different security policies for interconnected systems.
NIST SP 800-531 senseview framework →
§1
A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system boundary protection.

Outgoing relationships

No outgoing triples
This term is not the subject of any RDF-style relationship yet.

Incoming relationships

No incoming triples
No other term currently asserts a relationship to this one.