The primary use or function of the IT product as described by the checklist (e.g., client desktop host, web server, bastion host, network border protection, intrusion detection).
Source(s):
NIST SP 800-70 Rev. 4