CIS Control 13
The processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy and integrity of sensitive information.
Why is this Critical?
For most organizations, data is the most critical asset while at the same time the most easily exploitable target for an attacker. Especially in cloud environments, it is important that proper care be taken to limit and report on data exfiltration while also mitigating the effects of data compromise. Organizations should also carefully identify and separate their most critical and sensitive assets including those located onsite and at remote services providers.