Skip to main content

πŸ’Ό 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.

Description​

As follows:

  • All traffic is monitored at the perimeter of the CDE.
  • All traffic is monitored at critical points in the CDE.
  • Personnel are alerted to suspected compromises.
  • All intrusion-detection and prevention engines, baselines, and signatures are kept up to date.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/11/05/01
    • /frameworks/aws-fsbp-v1.0.0/guardduty/06
    • /frameworks/aws-fsbp-v1.0.0/guardduty/07
    • /frameworks/aws-fsbp-v1.0.0/guardduty/09
    • /frameworks/aws-fsbp-v1.0.0/guardduty/10

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.6] GuardDuty Lambda Protection should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.7] GuardDuty EKS Runtime Monitoring should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.9] GuardDuty RDS Protection should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.10] GuardDuty S3 Protection should be enabled
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.11

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect, alert on/prevent, and address covert malware communication channels.1

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS VPC Flow Logs are not enabled 🟒1🟠 x1, 🟒 x5