Question : A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they architect their solution to achieve these goals?
1. Configure an instance with monitoring software and the elastic network interface (ENI) set to promiscuous mode packet sniffing to see an traffic across the VPC. 2. Create a second VPC and route all traffic from the primary application VPC through the second VPC where the scalable virtualized IDS/IPS platform resides. 3. Access Mostly Uused Products by 50000+ Subscribers traffic through the platform to a scalable virtualized IDS/IPS. 4. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.
Answer: 4
Explanation: Many AWS customers install host-based IDS software, such as the open source product OSSEC, that includes file integrity checking and rootkit detection software. Use these products to analyze important system files and folders and calculate checksum that reflect their trusted state, and then regularly check to see whether these files have been modified and alert the system administrator if so.
A distributed threat protection solution: This approach installs threat protection agents on individual instances in the cloud. A central threat management server communicates with all host-based threat management agents for log collection, analysis, correlation, and active threat response purposes.
1. Configure an instance with monitoring software and the elastic network interface (ENI) set to promiscuous mode packet sniffing to see an traffic across the VPC. 2. Create a second VPC and route all traffic from the primary application VPC through the second VPC where the scalable virtualized IDS/IPS platform resides. 3. Access Mostly Uused Products by 50000+ Subscribers traffic through the platform to a scalable virtualized IDS/IPS. 4. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.