DS5.10 Network Security (2 of 2)
Ensure that security techniques and related management procedures are used to authorize access and regulate information flows from and to networks with controls such as firewalls and network segmentation.
Illustrative Controls and the TIBCO LogLogic Solution
Administrators must periodically review all firewall rules to ensure accurate access control list. In addition, Administrators must review network traffic correlated with the firewall policy to ensure appropriate rules are used to protect the company.
Review all remote access to the IT infrastructure using VPN or through firewalls. Detect any anomalies such as excessive IDS attacks or firewall traffic using behavioral-based alerts.
Copyright © Cloud Software Group, Inc. All rights reserved.