BOUNDARY PROTECTION Why is this important? The boundary under consideration is the electronic division between the industrial control system (ICS) and the enterprise network; think of servers and switches.  This boundary must be protected from undetected, unauthorized activity in critical systems. If boundary protection is weak, various threat vectors (pathways) may have access to interface