Exfiltration

Attackers who want to steal information must find a way to get a copy. This exfiltration can be made more difficult with strong networking and storage security policies.