Network Access Control 2.1 Flashcards
Edge vs. Access Control
Edge is security at the firewall, the edge of your network. Access control, controls outside and inside your network. You can set many rules such as access based on user, group, location, app, etc. It can be easily revoked or changed as necessary.
BYOD Policy (Bring Your Own Device)
Inherent risks. You don’t know what is on everyone’s devices. Controls include performing health checks before providing access (posture assessment). This checks various things such as what is installed on the device, is it mobile, disk encryption, OS, etc.
Health Check/Posture Assessment
Multiple methods to accomplish. Persistent Agents, Dissolvable Agents, Agentless NAC.
Persistent Agent
Permanent agent software installed on the device. Requires software updates.
Dissolvable Agent
No software. Runs when device is authenticating. Software runs on device, and when it passes, it deletes itself.
Agentless NAC (Network Access Control)
Occurs when the device logs in, and logs out. Can not be scheduled.
Failing Assessment
Tells you why your device did not pass. You are notified why you did not pass, and then you are put on a quarantine network with just enough access to fix the issues. Once resolved, you go through checks again. If you fail, you are put back on the quarantine network to continue resolving.