DS5.10 Network Security (1 of 2)
Ensure that security techniques and related management procedures are used to authorize access and control information flows from and to networks.
Illustrative Controls and the TIBCO LogLogic Solution
Administrators must periodically review IDS logs to ensure the IDS tools are fully utilized.
Review all remote access to the IT infrastructure through VPN or through firewalls. Detect any anomalies such as excessive IDS attacks or firewall traffic using behavioral-based alerts.
Copyright © Cloud Software Group, Inc. All rights reserved.