Scenario A: Traffic Monitoring Without NetFlow and sFlow
In this particular situation, the enterprise had failed to implement any network traffic monitoring protocols such as NetFlow or sFlow.
Here is a high-level outline of the network's response to the attack:
-
Bypassed threat detection and response—The network administrator does not detect any unusual network patterns or intrusions immediately following the attack.
-
Successful data breach—Consequently, the network is compromised through malicious traffic that gets undetected leading to loss of critical data and trust.
The overall network security posture is compromised due to lack of traffic monitoring mechanisms leading to poor visibility of the network and its functionalities.