SC-31: Covert Channel Analysis

From NIST's SP800-53:

a. Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and b. Estimate the maximum bandwidth of those channels.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.DS-5 Protections against data leaks are implemented

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1071.001 Web Protocols Command and Control
T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol Exfiltration
T1567 Exfiltration Over Web Service Exfiltration
T1071 Application Layer Protocol Command and Control
T1041 Exfiltration Over C2 Channel Exfiltration
T1071.002 File Transfer Protocols Command and Control
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol Exfiltration
T1071.004 DNS Command and Control
T1071.003 Mail Protocols Command and Control