Security Basics: Managing the Threat Part 4
(Network Access Control and Gateway Protection)
In previous blogs we talked about the need to educate end users, knowing the details of what activity is occurring on your network, and managing the threat through compliance. In part 4, we’re going to talk about protecting your network and web/email traffic.
First let’s talk about Network Access Control. Most enterprises have widespread networks across multiple locations with hundreds or thousands of network ports at each. Protecting these networks gives you peace of mind that a rouge machine will not get on the network and potentially capture data or cause disruptions. Another way to think of this is network endpoint compliance. Compliant machines get access to the network.
There are multiple ways to do Network Access Control (NAC), both directly involving the endpoint and components and indirectly, using only network switches to control access onto the network. Each deployment method has advantages. If you do endpoint-based NAC a small agent, either resident software on the endpoint or a dissolvable agent for machines that your enterprise can’t directly manage gets loaded on the system. A series of checks that are defined by the administrators then is ran to ensure that the endpoint has the minimum level of security required to get admission to the network. This gives the benefit of having the actual client handle the checks rather than a remote server that may not have proper privileges to the endpoint. Using the network device based NAC, the actual admission to the network is handled by opening and closing the port that the endpoint is attached to wired or wireless or switching VLANs to a quarantined network. This gives an additional layer of protection by stopping the physical connection of rouge or out of compliance endpoints from attaching to your network.
Some examples of widely used Network Access Control checks:
- Antivirus running and definitions updated in last 2 weeks.
- Firewall running.
- Client Hard Drive is encrypted.
- Endpoint Management processes running. ([Altiris], [Desktop Authority], [Bladelogic])
- Certain Registry keys present and version set.