Employ discovery techniques, processes, and tools to determine if external entities are replicating organizational information in an unauthorized manner.
ID | Name | Description | D3FEND |
ID | Description |
Requirement | Rationale/Additional Guidance/Notes |
---|
ID | Name | Description |
---|