ISC2 Governance, Risk and Compliance (CGRC) Practice Question
While drafting the System Security Plan (SSP) for a new cloud-hosted customer relationship management (CRM) platform, the security team has to show exactly which hardware, software, data stores, and network connections are inside the system's authorization boundary so that assessors will not expand the scope later. Which single artifact will most clearly communicate that in-scope versus out-of-scope separation?
A table mapping the platform's planned security controls to NIST SP 800-53 control families
An authorization boundary diagram that shows every CRM component and all internal and external interfaces
A comprehensive data-flow diagram that traces each transaction between the CRM and external services
A catalog of potential future CRM modules planned for post-authorization deployment
An authorization boundary diagram (ABD) depicts every component of the CRM platform together with all internal and external interfaces, clearly marking what is inside or outside the boundary. FedRAMP and NIST SSP templates require this diagram to establish the boundary that the subsequent security assessment will cover. Although a data-flow diagram, lists of users or future modules, and a control-family mapping provide useful details, none of them by themselves definitively establish the system's boundary.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Authorization Boundary Diagram (ABD)?
Open an interactive chat with Bash
How does an authorization boundary relate to NIST guidelines like NIST SP 800-53?
Open an interactive chat with Bash
How is an Authorization Boundary Diagram different from a Data-Flow Diagram (DFD)?
Open an interactive chat with Bash
What is an authorization boundary diagram (ABD)?
Open an interactive chat with Bash
Why does FedRAMP and NIST require an authorization boundary diagram in SSP templates?
Open an interactive chat with Bash
How does an authorization boundary diagram differ from a data flow diagram?
Open an interactive chat with Bash
ISC2 Governance, Risk and Compliance (CGRC)
Scope of the System
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .