IAB Interactive Standardized Equipment List   return to main tree

Search Interactive SEL:





Last Updated: 3/10/2024 7:02:58 PM

Description: System or software used as a vulnerable decoy to lure and detect attackers.

ImportantFeatures: May be dedicated appliances or virtual machine images.
Most honeypot solutions can emulate a variety of vulnerable network services.


Operating Considerations: Recommended only for organizations with a professional IT staff and substantial network infrastructure, as part of a risk management plan.
All honeypot activity must be closely monitored to maximize value.
Many solutions have known network fingerprints and could be easily detected by attackers.
If not configured properly, some honeypots may be used as pivot points by attackers, creating additional vulnerability.


Training Requirements: Per Manufacturer's recommendations.
Initial Training: Moderate (1-2 days)
Sustainment Training: Minimal (<1 day)


Mandatory Standards:

Applicable Standards and References: