SC-31: Covert Channel Analysis
From NIST's SP800-53:
a. Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and b. Estimate the maximum bandwidth of those channels.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
PR.DS-5 | Protections against data leaks are implemented |
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1071.001 | Web Protocols | Command and Control |
T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Exfiltration |
T1567 | Exfiltration Over Web Service | Exfiltration |
T1071 | Application Layer Protocol | Command and Control |
T1041 | Exfiltration Over C2 Channel | Exfiltration |
T1071.002 | File Transfer Protocols | Command and Control |
T1048 | Exfiltration Over Alternative Protocol | Exfiltration |
T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | Exfiltration |
T1071.004 | DNS | Command and Control |
T1071.003 | Mail Protocols | Command and Control |