We’re addressing Network Access Control (NAC) solutions separately from the Firewall, DNS, and Load Balancer solutions we covered in Chapter 6 for two reasons: First, to give vendors credit—NAC solutions represent early (and ongoing) attempts at achieving some of the principles of Zero Trust—specifically, the ability to enforce identity-centric access policies at the network level. Second, NAC deployments are generally going to be impacted as organizations deploy a modern Zero Trust architecture—the value and importance ...
© Jason Garbis and Jerry W. Chapman 2021
J. Garbis, J. W. ChapmanZero Trust Securityhttps://doi.org/10.1007/978-1-4842-6702-8_77. Network Access Control
Get Zero Trust Security: An Enterprise Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.