DS5.10 Network Security (1 of 2)

Ensure that security techniques and related management procedures are used to authorize access and control information flows from and to networks.

Illustrative Controls and the TIBCO LogLogic Solution

Administrators must periodically review IDS logs to ensure the IDS tools are fully utilized.

Review all remote access to the IT infrastructure through VPN or through firewalls. Detect any anomalies such as excessive IDS attacks or firewall traffic using behavioral-based alerts.

Reports and Alerts

Use the following link/reference to see the DS5.10 reports and alerts: DS5.10.