Procedure to ensure that information transfers within an information system are not made in violation of the security policy.
Source(s):
CNSSI 4009-2015
Procedure to ensure that information transfers within a system are not made in violation of the security policy.
Source(s):
NIST SP 800-171 Rev. 2
NIST SP 800-172
NIST SP 800-171 Rev. 1
[Superseded]
Controls to ensure that information transfers within a system or organization are not made in violation of the security policy.
Source(s):
NIST SP 800-53 Rev. 5