Implement [Assignment: host-based boundary protection mechanisms] at [Assignment: system components].
Supplemental Guidance
Host-based boundary protection mechanisms include host-based firewalls. System components that employ host-based boundary protection mechanisms include servers, workstations, notebook computers, and mobile devices.