Network Access Control

Before talking about authenticating users to the network, policies on network access controls should be covered. Networks are no longer monolithic entities. In most cases, there will be one external access point—a connection to the Internet via an Internet Service Provider (ISP). Network access control policies will look at what protections should be installed at the entry points to the network.

Gateways

Gateways are the points where network traffic is transferred from the organization’s network to another network. Policies covering access controls at these gateway points need to consider the nature of the network being bridged:

  • Dial-in and Dial-out access control policies. Cover the requirements for authentication. ...

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.