I think the answer C) identify all tools as either external or internal to the boundary, because it helps in clearly defining the boundary for authorization.
Yeah, I agree with Olene. The goal is to show all the systems and connections, not just the FedRAMP-authorized ones. We need the full picture to ensure proper authorization.
I'm not sure about the CIDR notation part. Isn't that more for network diagrams? I feel like ABDs are more focused on the systems and components themselves.
I think the key is to identify all the interconnected systems, both internal and external to the boundary. That way you can see the full scope of what needs to be authorized.
Kent
5 months agoJamal
5 months agoAmber
6 months agoTiara
6 months agoJess
6 months agoMy
6 months agoViola
6 months agoGeraldo
7 months agoViola
7 months agoGeraldo
7 months agoCandra
8 months agoCeleste
8 months agoOlene
8 months agoSuzi
8 months agoAshton
8 months agoLeota
8 months agoLili
8 months agoBette
8 months agoCatina
8 months ago