Documentation
HECVAT Full v3.0.6
Firewalls, IDS, IPS, and Networking
FIDP-10

Question FIDP-10

Is intrusion monitoring performed internally or by a third-party service?

Weight20
High RiskNo
RequiredYes
Compliant AnswerYes

Standard Guidance

In addition to stating your intrusion monitoring strategy, provide a brief summary of its implementation.

Answering "NO"

EDUCAUSE provides no guidance here

Answering "YES"

EDUCAUSE provides no guidance here

Reason for Question

This question is primarily focused on the capability of a vendor's security program. Understanding the size and skillsets of a vendor (taken from other responses) is needed to determine the appropriateness of the vendor's response to this question.

Follow-Up Inquiries

Follow-up inquiries for intrusion monitoring will be institution/implementation specific.

HECVAT Pro Advice

[Add expert insights and best practices]

Implementation Tips

[Add practical steps for SME SaaS vendors]

FAQ

[Add common questions related to this HECVAT item]

Resources

[Add links to relevant articles or tools]