Is intrusion monitoring performed internally or by a third-party service?
Explanation
Guidance
In addition to stating your intrusion monitoring strategy, provide a brief summary of its implementation.
Example Responses
Example Response 1
Our intrusion monitoring is performed internally by our Security Operations Center (SOC) team We have implemented a layered approach using Palo Alto Networks firewalls with threat prevention capabilities at network boundaries, Crowdstrike EDR on all endpoints, and Splunk SIEM for log aggregation and correlation Our SOC team operates on a 24x7 basis with analysts monitoring alerts in real-time We have documented playbooks for common attack scenarios, and our SOC team conducts regular threat hunting exercises to proactively identify potential compromises All critical alerts are investigated within 30 minutes, and we maintain a 15-minute SLA for responding to confirmed incidents.
Example Response 2
We utilize a hybrid approach to intrusion monitoring We maintain an internal security team that handles day-to-day security operations during business hours (8am-6pm ET), including alert triage and initial incident response For after-hours coverage and specialized threat hunting, we contract with Mandiant's Managed Defense service Our technical implementation includes Cisco Firepower IPS at network boundaries, Microsoft Defender for Endpoint on all workstations and servers, and Microsoft Sentinel as our SIEM platform The Mandiant team has access to our Sentinel instance and provides 24x7 monitoring coverage when our internal team is offline This hybrid model gives us the benefit of dedicated internal resources who understand our environment, supplemented by specialized expertise and round-the-clock coverage from our third-party provider.
Example Response 3
We currently do not have a formal intrusion monitoring program in place Our IT team receives alerts from our firewall when known malicious IP addresses attempt to connect, but we do not have dedicated security personnel monitoring for intrusions We rely on standard antivirus software on endpoints and conduct manual system checks when issues are reported by users We recognize this is a gap in our security posture and are evaluating options to implement a more robust intrusion monitoring capability in the next fiscal year, including potentially engaging a Managed Security Service Provider (MSSP) for 24x7 monitoring services.
Context
- Tab
- Infrastructure
- Category
- Firewalls, IDS, IPS, and Networking

