CSCv6|12.4

Title

Network-based IPS devices should be deployed to complement IDS by blocking known bad signatures or the behavior of potential attacks.

Description

Network-based IPS devices should be deployed to complement IDS by blocking known bad signatures or the behavior of potential attacks. As attacks become automated, methods such as IDS typically delay the amount of time it takes for someone to react to an attack. A properly configured network-based IPS can provide automation to block bad traffic. When evaluating network-based IPS products, include those using techniques other than signature-based detection (such as virtual machine or sandbox-based approaches) for consideration.

Reference Item Details

Category: Boundary Defense

Family: Network

Audit Items