Digital Asset Boundaries

1. Introduction

The following can be considered as Digital Assets:

  • Applications and processes

  • Data

Allowing humans to login to your IT systems (applications, processes), or allowing a process owned by another party to access (read and maybe modify) your data is the subject of Digital Asset Boundary Management.

2. Interlinkages with other building blocks

Digital Identity Authentication Authorization

Last updated