SI-4(18)—Information System Monitoring
Operational
>Control Description
INFORMATION SYSTEM MONITORING | ANALYZE TRAFFIC / COVERT EXFILTRATION The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at ⚙organization-defined interior points within the system (e.g., subsystems, sub-networks) to detect covert exfiltration of information.
>Supplemental Guidance
Covert means that can be used for the unauthorized exfiltration of organizational information include, for example, steganography.
Ask AI
Configure your API key to use AI features.