Develop security and privacy plans for the system that explicitly defines the authorization boundary for the system.
No STIG checks reference this CCI.