Designing Access Controls
Comprehensive Security Policy
The Process of Designing Access Control Security
This chapter outlines a
1.Choose the access control methods.
2.Make decisions about remote access (VPN).
3.Choose the endpoint integrity deployment method.
4.Choose the endpoint integrity testing method.
5.Choose Remote Authentication
6.Add ProCurve Identity Driven Manager (IDM).
7.Select an Extensible Authentication Protocol (EAP) method for 802.1X.
8.Finalize security policies.
9.Lay out the network.
As you go through each step in the process, you will return to the factors you considered in Chapter 2: “Customer Needs Assessment.” Some of these fac- tors are technical; others are business issues. A
Example Network
To illustrate which decisions need to be made and which aspects of your network need to be considered for each step, this chapter presents a hypo- thetical university. ProCurve University (PCU) enrolls approximately 20,000 students and employs approximately 4000 faculty, administrative, and support staff members.