Security Basics mailing list archives

Re: NAC Question


From: ushacker20002001 () yahoo com
Date: 25 Mar 2009 00:21:52 -0000

Hi,
If you're deploying NAC before looking at any anti-malware solution or IPS in place then this would be definitely 
expensive in terms of installation and management overhead.

However, NAC based implantation would ensure that unauthorized devices are not connected to the network, and even when 
operated under authorized user permissions. Also, make sure what needs to be done on each segment of the network, which 
services/applications are allowed and which are not. Based on justification of NAC environment, following could be your 
checklist.

-Policy on use of network services
-Enforced path
-User authentication for external connections
-Node authentication
-Remote diagnostic port protection
-Segregation in networks
-Network connection control
-Network routing control
-Security of network services


Good Luck!

Regards,
------
Shakeel Ali
Information Security Evangelist
Location:\x75\x6B\x2E\x75\x73\x2E\x70\x6B\x2E\x63\x6E\x2E\x63\x61\x2E\x75\x61\x65

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. 
Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified 
Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: