Designing Access Controls
Finalize Security Policies
3.
Plan your access policy group rules in Table
Table 3-89. Access Policy Group Rules
Access Policy Inputs |
|
|
|
| |
Group | Location | Time | System | WLAN | EI |
|
Outputs—Access Profile
Table
Table 3-90. Sample Access Policy Group Rules for PCU
Access Policy | Inputs |
|
|
|
|
|
Group |
|
|
|
|
|
|
Location | Time | System | WLAN | EI |
| |
|
| |||||
|
|
|
|
|
|
|
Global | any | any | any | any | Unknown | Quarantine |
|
|
|
|
|
|
|
Global | any | any | any | any | Fail | Quarantine |
|
|
|
|
|
|
|
Global | any | any | any | any | Infected | Quarantine |
|
|
|
|
|
|
|
IT admin | any | any | any | any | Pass | IT admin |
|
|
|
|
|
|
|
President and | any | any | any | PCU | Pass | President, etc. |
other |
|
|
|
|
|
|
executives |
|
|
|
|
|
|
|
|
|
|
|
|
|
Partners and | any | any | any | Guests | Pass | Unencrypted |
customers |
|
|
|
|
|
|
|
|
|
|
|
|
|