13.3
IG2 IG3

Deploy a Network Intrusion Detection Solution

Asset Type: Network
Security Function: Detect

Description

Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example implementations include the use of a Network Intrusion Detection System (NIDS) or equivalent cloud service provider (CSP) service.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Inventory all third-party service providers
7
Classify third parties by risk level
8
Conduct security assessments of critical vendors
9
Include security requirements in contracts

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Command-and-Control Traffic Over Encrypted Channels

Confidentiality

An attacker establishes encrypted C2 communications over HTTPS or DNS tunneling that bypass perimeter firewalls, remaining undetected because no network intrusion detection system is inspecting traffic patterns.

Network-Based Exploitation Traversing Unmonitored Segments

Integrity

An attacker exploits a vulnerability in an internal service, and the exploit traffic crosses network segments without triggering any alert because no NIDS is deployed to analyze east-west traffic.

Large-Scale Data Exfiltration via Network Protocols

Confidentiality

Sensitive data is exfiltrated in bulk over standard protocols like HTTP or FTP to an external staging server, and the anomalous data volume goes unnoticed without network-level intrusion detection.

Vulnerabilities (When Safeguard Absent)

No Network Traffic Anomaly Detection

Without a NIDS, malicious network traffic patterns such as port scans, exploit payloads, and beaconing behavior are not identified, leaving the network blind to active intrusions.

Unmonitored East-West Network Traffic

Internal network segments lack inspection capabilities, allowing attackers who have gained initial access to freely probe and exploit other systems within the environment.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually