Partition the system into [system components to reside in separate physical or logical domains or environments based on circumstances for the physical or logical separation of components are defined;] residing in separate [one of "physical"/"logical"] domains or environments based on [circumstances for the physical or logical separation of components are defined;].
Supplemental
System partitioning is part of a defense-in-depth protection strategy. Organizations determine the degree of physical separation of system components. Physical separation options include physically distinct components in separate racks in the same room, critical components in separate rooms, and geographical separation of critical components. Security categorization can guide the selection of candidates for domain partitioning. Managed interfaces restrict or prohibit network access and information flow among partitioned system components.