Topics on this page
|In-line Intrusion Detection or Intrusion Prevention|
|Attackers can use network-based techniques and attacks in order to exploit vulnerabilities in your applications, frameworks, and infrastructure. These vulnerabilities can include issues in your application, open-source libraries, or even the platforms and orchestration layers that they run on.|
|Successfully exploiting these vulnerabilities can give the attacker access to your data and network. Network Security inspects this traffic to help protect you against a broad range of these network-based attacks.|
|Rule ID: NS-IPS-001
Risk level: Extreme (not acceptable risk)
|Ensure that the Network Security virtual appliance is deployed inline to protect your cloud environment against common exploits such as SQL injection attacks, cross-site scripting (XSS) attacks, and Cross-Site Request Forgery (CSRF) attacks that could affect network availability and performance, compromise data security, or consume excessive resources.|
|This can help you with the following compliance standards:
Payment Card Industry Data Security Standard (PCI DSS)
|This rule can help you form your AWS Well-Architected Framework for seamless integration of AWS, Network Security, and Trend Micro Cloud One - Conformity.|
Audit in-line protection
To determine if in-line intrusion detection or intrusion prevention is enabled, perform the following actions:
From the Network Security management interface, click the Network icon in the navigation panel.
Click the Assets tab.
In the list of all added cloud accounts, in the bottom section, the number of protected assets is displayed.
Cloud Account A (53 of 53 assets protected)
Refresh the list to see the most current statuses.
If all of the assets are not protected, follow steps below to enable protection.
Enable in-line protection
To enable in-line intrusion detection or intrusion prevention, perform the following actions:
- From the Network Security management interface, click the Network icon in the navigation panel.
- Click the Assets tab.
- In the bottom section of the page, expand a VPC that contains unprotected assets.
- Click Deploy protection and follow the steps in the wizard.
- Repeat these steps to deploy protection for all unprotected assets.