Security Basics mailing list archives
Re: NAC Question
From: ushacker20002001 () yahoo com
Date: 25 Mar 2009 00:21:52 -0000
Hi, If you're deploying NAC before looking at any anti-malware solution or IPS in place then this would be definitely expensive in terms of installation and management overhead. However, NAC based implantation would ensure that unauthorized devices are not connected to the network, and even when operated under authorized user permissions. Also, make sure what needs to be done on each segment of the network, which services/applications are allowed and which are not. Based on justification of NAC environment, following could be your checklist. -Policy on use of network services -Enforced path -User authentication for external connections -Node authentication -Remote diagnostic port protection -Segregation in networks -Network connection control -Network routing control -Security of network services Good Luck! Regards, ------ Shakeel Ali Information Security Evangelist Location:\x75\x6B\x2E\x75\x73\x2E\x70\x6B\x2E\x63\x6E\x2E\x63\x61\x2E\x75\x61\x65 ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- NAC Question avghacker (Mar 24)
- Re: NAC Question exzactly (Mar 24)
- <Possible follow-ups>
- Re: NAC Question avghacker (Mar 24)
- Re: NAC Question Jason (Mar 25)
- Re: NAC Question badz (Mar 25)
- Re: NAC Question Noah . Lance (Mar 25)
- Re: NAC Question ushacker20002001 (Mar 25)
- Re: Re: NAC Question chmod1777 (Mar 25)