什么是网络访问控制? 

Network Control (NAC) is the process of leveraging security protocols such as endpoint monitoring 和 身份和访问管理(IAM) 最大限度地控制谁或什么可以访问专有网络.

经常, there are 系统s on a network that simply do not receive the same level of visibility as others. 因此,这些成为威胁行为者破坏网络的更容易的访问点. 根据Forrester, “security 和 risk pros need to address problems introduced by a mobile 和 remote workforce incentivized by cloud integrations. NAC解决方案过去和现在仍然被认为是复杂和昂贵的,难以有效部署.”

显然,每个组织的NAC看起来都不一样. 因此,让我们来看看两种不同类型的过程:

入院前

这种类型的NAC网络安全控制确保一个人, 系统, 或者希望访问网络的设备在实际访问之前被检查出. IAM authentication procedures can be leveraged during this process to ensure no one or thing is granted access to a network that doesn’t have a right to be there.

Post-admission

This type of NAC control essentially “follows” an authenticated user around the network, continuously verifying their credentials to ensure they aren’t admitted to a part or segment of the network they don’t need in order to do their job or complete a task. 以这种方式, 如果一个威胁行为者进入了一个特定的部分, 他们会被隔离在那个区域, 保护大型网络.

为什么需要网络访问控制? 

你需要NAC,因为有大量的威胁行为者在寻找 蛮力 他们通过低或不受监控的接入点进入网络. Visibility 和 automation are necessary to be able to cover the large scale of many enterprise networks, NAC解决方案可以在这些领域提供保护.

NAC解决方案的好处

这种类型的安全解决方案的内在好处包括:

  • 节约成本:通过限制网络上威胁行为者访问点的数量, 你限制了事件发生的次数. 即使你的安全机构有最先进和最快的 脆弱性管理事件响应 program, an NAC solution will help that much more in shutting out unnecessary incidents.
  • 合规: NAC解决方案有助于满足各种监管标准, whether it’s on a smaller scale like a state or territory or a larger scale like a country or kingdom. 通过控制网络接入点, it demonstrates to regulators that a business or security organization has the best intentions for everyone.
  • 最小化 攻击表面: Closing off access points to only those that need access helps to segment the network such that, 如果有坏人进入, 损害可能仅限于这一特定领域.
  • 身份验证: Implementing IAM protocols like multi-factor authentication (MFA) can help to thoroughly verify that the person or asset requesting network access does indeed have a right to be on the network. 零信任安全 也是一个强大的模式,以确保适当的网络访问.
  • 更强的安全态势: By incorporating NAC into your security program, you’re taking a step beyond average capabilities. You’re creating a stronger security posture by ensuring your network is locked down 和 everyone 和 everything properly authenticates to where they need to be.

网络访问控制功能

So, how exactly would an NAC solution help to fortify security posture 和 contain threats? NAC程序的具体功能有很多, 并最终有助于统一认证协议, 端点配置, 以及对企业环境的全面访问.

在为您的特定环境寻找NAC解决方案时, Gartner®州 “组织应评价下列能力”:

  • 设备能见度/分析: Which devices are attempting to access the corporate network 和 what are their risk profiles? 
  • 访问控制: This is the function of an NAC solution to actually control who gets in 和 who doesn't. 
  • 安全态势检查: A 云安全态势管理(CSPM) capability can provide visibility into the configuration of applications 和 workloads.
  • 客户管理:用户可以管理请求访问企业网络的访客, 包括身份验证和授予有限访问权限.
  • 与其他安全产品双向集成这很重要,尤其是在购物过程中 安全运营中心(SOC) leaders procure an NAC solution that can integrate 和 amplify their current suite of security solutions.

除了这些功能之外, it’s important to remember that compliance – as noted above – is critical 和 is also a moving target. 为了保持NAC解决方案功能的有效性, it’s a good idea for security practitioners to conduct periodic assessments 和 audits.

Scheduling regular network assessments 和 audits can ensure compliance with secure configurations, 密码策略, 以及接入网的控制要求. Assessing network security against internally constructed benchmarks can also help mitigate threats.

网络访问控制用例

NAC solutions are ubiquitous 和 they can do different things depending on the specific environment of the security organization looking to leverage its capabilities. 让我们看一下一些更常见的用例.

物联网(IoT)设备

随着员工将更多的物联网设备带入公司网络, IT teams must keep pace to try 和 ensure they are operating securely on the network. 自动化这个过程可以简化这个领域的操作, helping to authenticate each device 和 determine if its reason for accessing the network is valid.

自带设备(BYOD)

从BYOD趋势开始, it's been an ongoing evolution of how to balance the benefits with the risks that arise from letting your employees 和 partners use their own devices on the internal or corporate network. Powerful NAC solutions like authentication protocols 和 multi-step verification technologies have helped to ensure security while these devices are accessing the network.

供应链合作伙伴

当涉及到供应商, we’ll assume you’ve thoroughly vetted these partners 和 entrusted a portion of your business practices 和 services to their care. This means each of these providers will need at least a degree of access to your corporate network, with network segmentation helping to facilitate that access as well as protecting the network as a whole.

如何实现网络访问控制? 

You implement network access control by adhering to some stringent best practices that will help ensure the solution has its best chance to protect the organization. 

  • 对网络需求进行全面评估:在实现NAC解决方案之前, it’s important to know where your network’s access vulnerabilities lie as well as where they might exist in the near future. Where do you most need critical access controls that will keep network operations safe?
  • 确保正确的证书发给正确的人:如果你要实现NAC解决方案, 确保在特权领域没有责任是至关重要的. 云基础设施授权管理(CIEM) policies – like zero trust – can help to mitigate this potential vulnerability by ensuring everyone is stringently authenticated in multiple ways before being granted access.
  • 在审查供应商时自我教育我们已经讨论了一些合作伙伴和供应商, but the point cannot be understated: An NAC vendor should deliver a strong product that will help protect your network from unauthorized access 和 potential attack or data theft. The only way to purchase a solution that can do that is to thoroughly research 和 speak to an NAC vendor to ensure the function will meet your organization's specific needs.
  • 了解你的网络优势:您的网络扩展到什么程度,具体的云操作是什么? 网络边界可以扩展到全球, 但这并不意味着不可能确保接入点的安全.