SI-23 Information Fragmentation

System and Information Integrity

New in Rev 5

Description

Based on [Assignment: organization-defined parameters]: Fragment the following information: [Assignment: organization-defined parameters] ; and Distribute the fragmented information across the following systems or system components: [Assignment: organization-defined parameters].

Supplemental Guidance

One objective of the advanced persistent threat is to exfiltrate valuable information. Once exfiltrated, there is generally no way for the organization to recover the lost information. Therefore, organizations may consider dividing the information into disparate elements and distributing those elements across multiple systems or system components and locations. Such actions will increase the adversary’s work factor to capture and exfiltrate the desired information and, in so doing, increase the probability of detection. The fragmentation of information impacts the organization’s ability to access the information in a timely manner. The extent of the fragmentation is dictated by the impact or classification level (and value) of the information, threat intelligence information received, and whether data tainting is used (i.e., data tainting-derived information about the exfiltration of some information could result in the fragmentation of the remaining information).

Changes from Rev 4

New control in Rev 5.

MITRE ATT&CK Techniques (7)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Execution 1 Defense Evasion 3 Lateral Movement 1 Collection 1 Impact 2

Compliance Mappings

RBI CSF

Annex1.4