17.5k views
3 votes
A medium-sized organization is upgrading its network infrastructure to secure its enterprise infrastructure by implementing an intrusion prevention system (IPS) and an intrusion detection system (IDS). The organization has sensitive data in different security zones, and the IT manager has concerns regarding the attack surface and network connectivity. Which of the following placements of the IPS/IDS devices would be MOST effective in this scenario? A. Place the IPS/IDS devices near the load balancer to monitor traffic distribution. B. Place the IPS/IDS devices just inside the organization's firewall to monitor the internal network. C. Place the IPS/IDS devices at each end of the VPN tunnel to monitor remote access. D. Place the IPS/IDS devices at the network perimeter to monitor inbound and outbound traffic.

User Mils
by
7.9k points

1 Answer

0 votes

Final answer:

The optimal placement of IPS/IDS devices to secure an enterprise infrastructure is at the network perimeter. This allows for the monitoring of all inbound and outbound traffic, ensuring threats are detected and prevented before they can penetrate deeper into the network.

Step-by-step explanation:

The most effective placement of Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) devices for securing an enterprise infrastructure would be option D: Place the IPS/IDS devices at the network perimeter to monitor inbound and outbound traffic. This positioning ensures that all traffic entering and leaving the network is analyzed, allowing for the identification and prevention of potential threats before they reach the internal network. By placing IPS/IDS devices just outside the firewall, the organization can keep an eye on all traffic and can better secure sensitive data in different security zones.

Option A, placing the devices near a load balancer, would only monitor traffic distribution and may not cover all security zones effectively. Option B would only monitor internal network activities after potential threats have breached the perimeter defenses. Option C, at each end of a VPN tunnel, is good for monitoring remote access but leaves other entry points unprotected. Hence, the comprehensive coverage provided by option D is most suitable in an organization concerned about its attack surface and network connectivity.

User Slack Shot
by
8.3k points