With the continuous improvement of power monitoring system, the deployment of networks, security devices, and business applications within them has been increasing. Consequently, the associated network boundary security strategies have become increasingly complex, often spanning multiple suppliers, equipment manufacturers, and physical locations.This complexity leads to challenges for operation and maintenance, and reliance on manual security management methods results in low accuracy, significantly increasing risk of network attacks on the company’s important business and core data assets. Therefore, there is an urgent need to enhance the construction of a network boundary security strategy management system. This article proposes a unified management system for security boundary strategies based on network security device asset analysis, power monitoring system routing topology analysis, and information security device strategy analysis, taking into account the characteristics of network security devices in power monitoring systems. Corresponding software platforms have been developed to calculate network security strategies based on asset detection, routing strategy collection, and protection strategy collection, which have implemented unified policy management of security boundaries. The research and practical deployment have shown that the system effectively improves operational efficiency and system security, demonstrating good relevance, practicality and advancement for the power monitoring system.