Designing Access Controls

Choose the Endpoint Integrity Deployment Method

For wireless and wired connections, however, you will primarily base your decision on the factors discussed in the previous sections.

Table 3-39. Deployment Method by Connection Type

Factor

Private Wired

Public Wired

Private

Public Wireless

Remote

 

 

 

Wireless

 

 

 

 

 

 

 

 

Connection type

n/a

n/a

n/a

n/a

Inline

 

 

 

 

 

 

Bringing the Factors Together

As you consider each factor that directly affects the deployment method, you should record the decision you would make based on that factor in a table such as Table 3-40.Record the decisions made most often in the “Total” rows. Again, you will need to do a reality check after tallying up the results. For example, the access control method is often the most important factor.

Table 3-40. Preliminary Decisions for the Endpoint Integrity Deployment Method

Factor

Weight

Private Wired Public Wired Private

Public

Remote

 

 

Wireless

Wireless

 

 

 

 

 

 

Selected access control method

Security

Existing network infrastructure

Connection type

Total

Example

For example, the PCU network administrators compiled their choices in

Table 3-41.

3-57