Employ discovery techniques, processes, and tools to determine if external entities are replicating organizational information in an unauthorized manner.
| ID | Name | Description | D3FEND | |
| ID | Description | |
| Requirement | Rationale/Additional Guidance/Notes |
|---|
| ID | Name | Description | |
|---|---|---|---|