16.2. Create (or Revise) Your Corporate Security Policy

Your NAC implementation is only one piece in a broader corporate security policy that governs the types of technologies that are implemented to ensure proper security in your organization's network. This policy should provide guidelines that you can follow when planning for NAC in your network, and you and the other members of the implementation team can use this policy as an ongoing reference throughout your implementation. For example, a core set of endpoint security or authentication requirements might apply to all employees who want to access network resources. These requirements have a direct impact on the policies that you create while you roll out NAC. Chapter 6 covers this topic in detail, if you want to know more about corporate security policies.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset