The information system:
-
(a): Detects and denies outgoing communications traffic posing a threat to external information systems; and
-
(b): Audits the identity of internal users associated with denied communications.
Supplemental
Detecting outgoing communications traffic from internal actions that may pose threats to external information systems is sometimes termed extrusion detection. Extrusion detection at information system boundaries as part of managed interfaces includes the analysis of incoming and outgoing communications traffic searching for indications of internal threats to the security of external systems. Such threats include, for example, traffic indicative of denial of service attacks and traffic containing malicious code.