The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.