SI-04(18)—System Monitoring | Analyze Traffic and Covert Exfiltration
Moderate
>Control Description
Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: ⚙organization-defined interior points within the system.
>Discussion
Organization-defined interior points include subnetworks and subsystems. Covert means that can be used to exfiltrate information include steganography.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.