• Requirement

    Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: [Assignment: organization-defined interior points within the system].

  • Discussion

    Organization-defined interior points include subnetworks and subsystems. Covert means that can be used to exfiltrate information include steganography.

More Info

  • Title

    System Monitoring | Analyze Traffic and Covert Exfiltration
  • Family

    System and Information Integrity
  • Related NIST 800-53 ID

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!