
Designing Access Controls
Finalize Security Policies
3.
Plan your access policy group rules in Table 
Table 3-89.  Access Policy Group Rules
| Access Policy Inputs | 
 | 
 | 
 | 
 | |
| Group | Location | Time | System | WLAN | EI | 
| 
 | |||||
Outputs—Access  Profile
Table 
Table 3-90.  Sample Access Policy Group Rules for PCU
| Access Policy | Inputs | 
 | 
 | 
 | 
 | 
 | 
| Group | 
 | 
 | 
 | 
 | 
 | 
 | 
| Location | Time | System | WLAN | EI | 
 | |
| 
 | 
 | |||||
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Global | any | any | any | any | Unknown | Quarantine | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Global | any | any | any | any | Fail | Quarantine | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Global | any | any | any | any | Infected | Quarantine | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| IT admin | any | any | any | any | Pass | IT admin | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| President and | any | any | any | PCU | Pass | President, etc. | 
| other | 
 | 
 | 
 | 
 | 
 | 
 | 
| executives | 
 | 
 | 
 | 
 | 
 | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Partners and | any | any | any | Guests | Pass | Unencrypted | 
| customers | 
 | 
 | 
 | 
 | 
 | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
