Following scenario:
- Web application, only HTTP/S traffic
- Firewall in place to only allow traffic on port 80/443 in
- WAF is in place, set to deny malicious traffic
Question: Is there any added value in this scenario to also have an IPS / Deep Package Inspection solution in place? From all I understand: No. But I didn't find any clear answer out there.
To answer the question, first let's unpack they key term "value". What we're doing here is asking "what's the value of a security control?".
Security controls (WAFs, IPSs, SPI firewalls being examples of technical security controls) are put in place to manage risk. Security controls that cost more than the expected loss over time of not having the control would not typically be put in place, and ones that cost less than the expected loss over time would be put in place.
Whether there's any value in putting an IPS in when a firewall limited to one port and a WAF is in place is really asking this question: Is the expected loss based on how everything is set up at the moment minus the expected loss after the IPS has been put in place greater than the cost of the IPS. If the answer is
yes
then there's no value in putting in an IPS, since the cost of putting it in is greater than the benefit it provides. This is an example of the risk management process in action.When it comes to this particular situation, there is not enough information to definitively answer the question. Any technical answer given is not going to do it. Even if we had all the information, which would be extensive, there are enough variations in how people calculate risk that we'd definitely not be able to do anything beyond giving "a way of doing it", and possibly the longest Serverfault answer ever :-)
In general terms though, these are areas where an IPS (we'll conflate HIPS and NIPS here for simplicity) provides opportunity for value when implemented along with the existing solutions:
In summary, whether an IPS is of value will depend on risk. There are certainly scenarios where one would choose to put in an IPS in this scenario even if it provided only redundancy and no additional functionality - the "belt and braces" approach. If protecting a personal website, probably not going to be worth it, if protecting billions of dollars worth of intellectual property, more likely to be of value.
You don't need to use packet-inspection if you setup your firewall correctly. but you still need IPS/IDS and integrity check even though you have only one simple server with minimum services.
consider these situations :
if you have concern about your setting, but you don't want to use a complicated or expensive solution, you can combine very basic tools like "iptables" customized rules with "SElinux" and "AIDE" for stronger security plan.
You can setup the WAF in DMZ to protect internet traffic. Also, IDS/IPS plus DPI can be use in the internal network, active or passive(inline or not).