13.3: Deploy a Network Intrusion Detection Solution

CSF v1.1 References:

Threats Addressed:


Previous Version:

Control Statement

Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example implementations include the use of a Network Intrusion Detection System (NIDS) or equivalent cloud service provider (CSP) service.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]