§Alternatives Considered:
□Network traffic could be
allowed in without being passed through a single
Intrusion Prevention System (IPS)
▪Opens up a potential
bottleneck
▪Relies on separate security
systems
▪Considered
but rejected to preserve security/integrity of the
system