Threat Detection and Prevention
2025.8
In order to preserve the integrity of data that Matrak stores, processes, or transmits for Customers, Matrak implements strong intrusion detection tools and policies to proactively track and retroactively investigate unauthorized access. This include threat detection and prevention at both the network and host level, as well as threat intelligence monitoring.
Policy Statements
Matrak policy requires that:
(a) All critical systems, assets and environments must implement realtime threat detection or prevention.
Controls and Procedures
Firewall Protection
Firewall protection is implemented at the following layers
-
Network - including Network ACL and Security Groups in AWS as well as on- premise firewalls between the office networks and the Internet.
-
Host - local firewalls are enabled on the user endpoints as well as servers (compute and database instances in AWS are protected by security groups)
-
Application - web application firewall (WAF) and content distribution are configured at the application layer to protect against common web application attacks such as cross site scripting, injection and denial-of-service attacks.
Network Intrusion Detection
Intrusion Detection for On-Premise Internal Networks
- Matrak leverages AWS GuardDuty for network security of its on-premise environments.
- AWS GuardDuty features stateful firewall inspection and intrusion detection/prevention (IDS/IPS) of applicable incoming and outgoing network traffic. Attacks and suspicious network activities are blocked automatically.
- Matrak IT manager is responsible for configuring the firewall and IDS/IPS rules and review the configuration as least quarterly.
Intrusion Detection in AWS Cloud Environments
Matrak implemented a real-time threat detection solution by monitoring AWS Cloudtrail events and/or VPC flow logs.
- Cloudtrail events are monitored by AWS GuardDuty
- VPC flow logs are sent to and analyzed by AWS GuardDuty.
Additional monitoring is provided by our infrastructure service provider AWS.
Host Intrusion Detection
Host based intrusion detection is supported via one of the following:
-
On Windows and macOS systems: AWS Inspector agents for malware detection and behavior-based endpoint threat detection.
-
On Linux servers: AWS Inspector agents for activity monitoring, vulnerability scanning, and threat detection. This includes all virtual instances running in the cloud environment.
Web Application Protection
leverages AWS Services to protect web applications against common attacks such as SQL injection, cross-site scripting, and denial-of-service (DoS/DDoS) attacks. The services used include AWS Shield, WAF, Cloudfront, and/or API Gateway.
Centralized Security Information and Event Management
Security events and alerts are aggregated to and correlated by one or both of the following solutions:
- Notion
- Internally developed security automation tooling