Hey Sysadmin,
I need some ideas around “IDS/IPS”.
- What are people using for passing security audits?
- What about for AWS / Azure?
- Can they cover devices on/off prem (work from home, etc)
- What is a figure that your management team actually approved?
Hey Sysadmin,
I need some ideas around “IDS/IPS”.
Not professional sysadmin. I run my homelab and handles a few servers at work. I don’t use IDS. So may be irrelevant.
For me, a lot more emphasis is on defending the application
stunnel
between application and databaseI’m currently looking into the Linux port of pledge to further reduce post exploit attack surface. But the project is not mature enough for production, yet.