A boundary defines the scope of an organisation’s Information Security Management System (ISMS). It specifies which business processes, physical locations, assets, and technologies are included within the ISMS. The boundary ensures that the security controls and policies implemented are applied consistently to everything within that defined scope.
ISO 27001 Context
Defining the ISMS boundary is a mandatory and foundational step in ISO 27001 Clause 4.3: Determining The Scope Of The Information Security Management System of the ISO 27001 standard. A clearly defined boundary is essential for the effectiveness of the ISMS and for successful certification, as an auditor will use it to determine what is and isn’t included in their review.