SI-4(18)
SI-4(18): Analyze Traffic / Covert Exfiltration
The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at [organization-defined interior points within the system (e.g., subsystems, subnetworks)] to detect covert exfiltration of information.
Supplemental
Covert means that can be used for the unauthorized exfiltration of organizational information include, for example, steganography.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |