MON-11.1—Analyze Traffic for Covert Exfiltration
Weight: 5
>Control Description
Automated mechanisms exist to analyze network traffic to detect covert data exfiltration.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.
Configure your API key to use AI features.