Digital Asset Boundaries
1. Introduction
The following can be considered as Digital Assets:
Applications and processes
Data
Allowing humans to login to your IT systems (applications, processes), or allowing a process owned by another party to access (read and maybe modify) your data is the subject of Digital Asset Boundary Management.
2. Interlinkages with other building blocks
Last updated