SI-4(18)
SI-4(18): Analyze Traffic and Covert Exfiltration
Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: [interior points within the system where communications traffic is to be analyzed are defined;].
Supplemental
Organization-defined interior points include subnetworks and subsystems. Covert means that can be used to exfiltrate information include steganography.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | unknown |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline, NC3 |
| CSF Categories |
|---|
| None |