Under active development Content is continuously updated and improved

SI-4(18)Information System Monitoring

Operational

>Control Description

INFORMATION SYSTEM MONITORING | ANALYZE TRAFFIC / COVERT EXFILTRATION The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at organization-defined interior points within the system (e.g., subsystems, sub-networks) to detect covert exfiltration of information.

>Supplemental Guidance

Covert means that can be used for the unauthorized exfiltration of organizational information include, for example, steganography.

Ask AI

Configure your API key to use AI features.