Use “mapping” to Document What You Have
CIS Control Group 1, Control 1.2, Asset Type = Device, Security Function = Respond Address Unauthorized Assets Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset
My Tribe leverages a Network Access Control solution to allow/deny network connections in real time via 802.1x. Extensible Authentication Protocol (EAP) Chaining is used to chain user and machine authentications together. This protocol ensures that only corporate users can authenticate to the network using a corporate-issued computer. Users and devices are registered in Active Directory to validate authorized users and device.
from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
Something you are. Something you have. Something you know.
Made with FlippingBook - Online catalogs