Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

11.5.1Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network as follows: All traffic is monitored at the perimeter of the CDE.

>Requirement Description

Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network as follows: All traffic is monitored at the perimeter of the CDE. All traffic is monitored at critical points in the CDE. Personnel are alerted to suspected compromises. All intrusion-detection and prevention engines, baselines, and signatures are kept up to date.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.