NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-31(1)Test Covert Channels for Exploitability

Test a subset of the identified covert channels to determine the channels that are exploitable.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

None.

Practitioner Notes

After identifying covert channels, test whether they can actually be exploited to transfer meaningful amounts of data.

Example 1: Use a DNS tunneling tool (like dnscat2 or iodine) in a controlled test to measure the bandwidth achievable through DNS covert channels on your network. If the bandwidth is high enough to be useful to an attacker, implement countermeasures.

Example 2: Test timing covert channels by measuring whether one process can reliably communicate information to another by modulating its use of shared resources (CPU, memory). Document the maximum achievable bandwidth and determine if it poses an acceptable risk.