Rule ID
SV-278979r1137725_rule
Version
V3R4
CCIs
Encrypted traffic, asymmetric routing architectures, capacity and latency limitations, and transitioning from older to newer technologies (e.g., IPv4 to IPv6 network protocol transition) may result in blind spots for organizations when analyzing network traffic. Collecting, decrypting, pre-processing, and distributing only relevant traffic to monitoring devices can streamline the efficiency and use of devices and optimize traffic analysis. This requirement also applies to Zero Trust initiatives.
Verify the IDPS is configured to provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices. If the IDPS does not provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices, this is a finding.
Configure the IDPS to provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.