Designing a HIPAA-Compliant Security Operations Center by Eric C. Thompson

Designing a HIPAA-Compliant Security Operations Center by Eric C. Thompson

Author:Eric C. Thompson
Language: eng
Format: epub
ISBN: 9781484256084
Publisher: Apress


Architecting and Deployment

One way to deploy an IDS is placing it at a network ingress/egress point. This captures north-south traffic. Figure 5-12 represents the use of a mirroring port on a router capturing traffic from an internal/external egress point.

Figure 5-12Deploying an IDS such as Snort to capture ingress/egress traffic

Deployments should also be placed to capture east-west traffic, traffic traversing inside the network not destined for external locations. This is an important piece of visibility. When unauthorized individuals are inside the network, IDS devices can capture traffic indicating lateral movement. Other considerations when deploying an IDS include the data to protect and an understanding of threats and vulnerabilities in the network. This context is necessary to develop rules applicable to the entity.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.