
Designing Access Controls
Choose the Endpoint Integrity Deployment Method
For wireless and wired connections, however, you will primarily base your decision on the factors discussed in the previous sections.
Table 3-39. Deployment Method by Connection Type
Factor | Private Wired | Public Wired | Private | Public Wireless | Remote |
|
|
| Wireless |
|
|
|
|
|
|
|
|
Connection type | n/a | n/a | n/a | n/a | Inline |
|
|
|
|
|
|
Bringing the Factors Together
As you consider each factor that directly affects the deployment method, you should record the decision you would make based on that factor in a table such as Table
Table
Factor | Weight | Private Wired Public Wired Private | Public | Remote |
|
| Wireless | Wireless |
|
|
|
|
|
|
Selected access control method
Security
Existing network infrastructure
Connection type
Total
Example
For example, the PCU network administrators compiled their choices in
Table