This objective ensures that your organization has formally documented where and how key security functions are isolated from general user functionality. These functions must be clearly identified and described in your policies, architecture diagrams, or System Security Plan (SSP), especially where they protect Controlled Unclassified Information (CUI).

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.