• Requirement

    Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: [Assignment: organization-defined interior points within the system].

  • Discussion

    Organization-defined interior points include subnetworks and subsystems. Covert means that can be used to exfiltrate information include steganography.

More Info

  • Title

    System Monitoring | Analyze Traffic and Covert Exfiltration
  • Family

    System and Information Integrity
  • NIST 800-53B Baseline(s)

    • Related NIST 800-53 ID

    NIST 800-53A Assessment Guidance

    CMMC Training

    Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!