Designing Access Controls

Comprehensive Security Policy

The PCU staff also creates a simple diagram of the current network configu- ration and assigns endpoints and resources to network access zones.

Figure 3-3. Network Infrastructure Divided into Access Zones

3-12

Page 128
Image 128
HP Access Control Client Software manual Network Infrastructure Divided into Access Zones