SecaaS Category 6 // Intrusion Management Implementation Guidance

Because of the limited market maturity and lack of widely accepted best practices, this document provides implementation guidelines for cloud-based intrusion management service of multiple flavors—in the cloud, through the cloud, or from the cloud—focusing on the basic tenets of service and architecture rather than solutions.

Release Date: 10/08/2012

Artifact Request

Address Information

Having read and understood the CSA’s Privacy Policy,

I specifically consent to receive marketing messages via the following channels: