MON-11.1 ยท Analyze Traffic for Covert Exfiltration

Control Description

Automated mechanisms exist to analyze network traffic to detect covert data exfiltration.

Control Question
Assessment question for control validation

Does the organization use automated mechanisms to analyze network traffic to detect covert data exfiltration?

Control Weighting
5
Validation Cadence
Quarterly
NIST CSF Function
Detect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical