Intrusion Detection

By Subraya Mallya - July 2010 | Topics - Cloud Computing

Intrusion Detection is the process by which you determine if there has been attempts to gain authorized access to data or application that is deemed as confidential.

The source of  intrusion could be through any of the following means

  • application, either through Unauthorized Accounts, SQL injection, URL hacking or cracking passwords
  • network infrastructure, through open ports, hacking firewalls, malware

How do I prevent these?

For starters here are 5 things you could do to prevent

  1. Where possible, implement IP based filter to ensure that users from trusted IP address access the service. This way, in case of a breach, you can trace the intruder back to the IP address.
  2. Strictly follow your policy of terminating accounts of ex-employees, contractors, evaluation accounts. No exceptions.
  3. Ensure that you have robust password management framework and password store that is one-way encrypted.
  4. Ensure that all the necessary patches are applied to your IT infrastructure components including server patches, router firmware upgrades, firewall upgrades, database patches, anti-virus upgrades on user desktops.
  5. Implement Intrusion Prevention Systems, that will regularly check for potential vulnerabilities by conducting activities like port scans, failed logins, abnormal activities, log mining.

We would love to hear your thoughts. Please leave a comment

Note: Please review our Comment Policy

You must be logged in to post a comment.

Back to Top

Discover more from PrudentCloud

Subscribe now to keep reading and get access to the full archive.

Continue reading