13.3—Deploy a Network Intrusion Detection Solution
IG2
IG3
Network
Detect
>Control Description
Deploy a network intrusion detection solution on enterprise assets, where appropriate. Example implementations include the use of a Network Intrusion Detection System (NIDS) or equivalent cloud service provider (CSP) service.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
Ask AI
Configure your API key to use AI features.