Back to Trust Center
I
Isolation of Information System Components

Mechanisms exist to employ boundary protections to isolate systems, services and processes that support critical missions and/or business functions.