Procedure to ensure that information transfers within an information system are not made in violation of the security policy.SOURCE: CNSSI-4009