Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: interior points.
Organization-defined interior points include subnetworks and subsystems. Covert means that can be used to exfiltrate information include steganography.
outbound communications traffic is analyzed at interfaces external to the system to detect covert exfiltration of information; outbound communications traffic is analyzed at interior points to detect covert exfiltration of information.
No cross-framework mappings available