Automated mechanisms exist to prevent the unauthorized exfiltration of sensitive/regulated data across managed interfaces.
Does the organization use automated mechanisms to prevent the unauthorized exfiltration of sensitive/regulated data across managed interfaces?