Skip to content

What kind of IDS do we need?

Question: 
What are the specific requirements regarding the use of an Intrusion Detection System? Can we just check the log files of my PIX and verify that no unusual traffic has been logged? Or do we have to have an actual IDS in place that that alerts us via email, and /or pager in case of attack? We have 4 branch offices, of which 3 are connected to the main office via a wireless connection. We also have 4 home users that are connected via wireless connections. Do we have to have an IDS system for both the internet connection and the wireless connections?
Answer: 

Answer by Clayton Hoskinson:

Since your PIX box is actually a firewall, and not an Intrusion Detection System appliance, they do not do the same job. Admittedly, if you are constantly watching your logs on the PIX device, you might be able to use them as an IDS of sorts. But since not many administrators have the time to constantly monitor the firewall logs, the use of a firewall as your IDS appliance is not really a good idea.

Answer: 

Answer by Mary Beth Guard:

Insofar as regulatory requirements, the Information Security Guidelines do not mandate the use of an Intrusion Detection System, but it is one of the eight categories of security measures each institution is required to evaluate and, if appropriate, adopt. There is no specificity in the guidelines regarding the type of IDS that should be used. The determination of what is necessary and appropriate must be made by an individual institution's management and board based upon its analysis of the risks. One size does not fit all, and there is no universal standard for what is right in this area.

First published on BankersOnline.com 1/6/03

First published on 01/06/2003

Banker Store View All

From training, policies, forms, and publications, to office products and occasional gifts, it’s available here:

Banker Store

hot right now

image description

Looking for effective, convenient training on a particular subject?

BOL Learning Connect offers more than 200 courses ON-DEMAND or on CD ROM from AML to Reg Z and every topic in between.

Search Topics