Building Threat Protection Layers

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Many organizations consider layered security to be a best practice for protecting network infrastructure. In the cloud, you can use a combination of Amazon VPC, implicit firewall rules at the hypervisor-layer, alongside network access control lists, security groups, host-based firewalls, and IDS/IPS systems to create a layered solution for network security.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Examples of inline threat protection technologies include the following:
- Third-party firewall devices installed on Amazon EC2 instances (also known as soft blades)
- Unified threat management (UTM) gateways
- Intrusion prevention systems
- Data loss management gateways
- Anomaly detection gateways
- Advanced persistent threat detection gateways

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf