Deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these systems at each of the organization's network boundaries.
Measures
>indicators of compromise (IOCs) and network telemetry is used to identify attacks
>Fressnes(how frequently IOC is collected)
> Completeness(How much is covered by listed IOC)
Deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these systems at each of the organization's network boundaries.
Measures
Metrics