Tackling this first step alone can be daunting, and it might seem like you will have to break the budget to get started. I have had several conversations with individuals who are the only security personnel for their company. Now, at this point I know some readers might feel a little overwhelmed with where to even begin with this, or feel like this just isn’t possible. Just consider a commercial NAC solution a future point on your security roadmap. But, remember implementing the controls is about finding the quick easy wins and working your way up to more complicated solutions. You most likely will be looking into a commercial solution like Cisco ISC or ForeScout for this. This doesn’t just mean endpoint laptops and desktops, but servers and phones as well. Two great practices for your organization should be to require 802.1x and NAC, and client-side certificates to authenticate connecting to your network. Now that we have captured this information, let’s look at a more preventative approach to devices trying to get on your network, and how to secure that. It also can help answer the question… What is this? It should go without saying, but when information like this is put together and a device accesses your network that isn’t authorized, make sure there is a plan in place to remove that device in a time frame that is agreed upon by your team or to authorize it. Any other information you and your team find valuable.If that device has even been approved to be on the network in the first place.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |