Security Solutions

3-57
Designing Access Controls
Choose the Endpoint Integrity Deployment Method
For wireless and wired connections, however, you will primarily base your
decision on the factors discussed in the previous sections.
Table 3-39. Deployment Method by Connection Type
Bringing the Factors Together
As you consider each factor that directly affects the deployment method, you
should record the decision you would make based on that factor in a table
such as Table 3-40. Record the decisions made most often in the “Total” rows.
Again, you will need to do a reality check after tallying up the results. For
example, the access control method is often the most important factor.
Table 3-40. Preliminary Decisions for the Endpoint Integrity Deployment Method
Example
For example, the PCU network administrators compiled their choices in
Table 3-41.
Factor Private Wired Public Wired Private
Wireless
Public Wireless Remote
Connection type n/a n/a n/a n/a Inline
Factor Weight Private Wired Public Wired Private
Wireless
Public
Wireless
Remote
Selected access
control method
Security
Existing network
infrastructure
Connection type
To ta l