• Requirement

    Provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.

  • Discussion

    Encrypted traffic, asymmetric routing architectures, capacity and latency limitations, and transitioning from older to newer technologies (e.g., IPv4 to IPv6 network protocol transition) may result in blind spots for organizations when analyzing network traffic. Collecting, decrypting, pre-processing, and distributing only relevant traffic to monitoring devices can streamline the efficiency and use of devices and optimize traffic analysis.

More Info

  • Title

    System Monitoring | Optimize Network Traffic Analysis
  • Family

    System and Information Integrity
  • Related NIST 800-53 ID

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!