DRHCSEC07-BP01 Implement network traffic inspection-based protection - Data Residency and Hybrid Cloud Lens

DRHCSEC07-BP01 Implement network traffic inspection-based protection

Set up traffic inspection points between your network layers to make sure data in transit matches the expected categories and patterns. Analyze traffic flows, metadata, and patterns to help identify, detect, and respond to events more effectively. Traffic Inspection can be implemented using EC2 instances, including those running on Outposts or Local Zones.

Desired outcome: Traffic that traverses between your network layers is inspected and authorized. Allow and deny decisions are based on explicit rules, threat intelligence, and deviations from baseline behaviors. Protections become stricter as traffic moves closer to sensitive data.

Common anti-patterns

  • Relying solely on rules based on ports and protocols.

Benefits of establishing this best practice: Inspection systems help you author intelligent rules, such as allowing or denying traffic only when certain conditions within the traffic data are met.

Level of risk exposed if this best practice is not established: Medium

Implementation guidance

Resources

Related best practices:

Related documentation: