The document discusses authorization boundaries and security categorization. It defines authorization boundaries as establishing the scope of protection for an information system, including people, processes, technologies, and information that are part of each system. Security categorization involves determining the potential impact levels for confidentiality, integrity and availability of each type of information processed, stored or transmitted by the system. The system is then assigned an overall category of low, moderate or high based on the highest impact level, known as the "high water mark". The security categorization must be reviewed and approved.