Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or Intrusion protection systems (IDS/IPS)?
A.
Intrusion detection techniques are required on all system components.
B.
Intrusion detection techniques are required to alert personnel of suspected compromises.
C.
Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems
D.
Intrusion detection techniques are required to identify all instances of cardholder data.
Requirement 11.4 mandates the implementation of intrusion detection and/or intrusion prevention techniques to alert personnel of suspected compromises within the cardholder data environment (CDE).
Purpose of IDS/IPS:
These systems are deployed to identify potential threats and alert relevant personnel, enabling them to take corrective actions to prevent data breaches.
Rationale Behind Correct Answer:
A:Intrusion detection is required only for in-scope components, not all system components.
C/D:Intrusion detection systems do not perform isolation or identification of all cardholder data; they monitor for and alert on potential intrusions.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit