Hows NAC working for you? Are you even implementing or planning for it?
Depending on whom you talk to, youll hear that network access control is either dead or its being widely studied and implemented.
The good news story says that compliance, SOX in particular, is the main force driving implementations. This makes sense to me from the point of view that compliance is, in part, about getting control of your systems. NAC helps you get that control, or at least to say that youre making an organized and good-faith effort to get that control.
The counterarguments say, as reports such as a recent Forrester report did, that current NAC implementations are proving difficult and impractical. Joseph Tardo of Nevis Networks agrees with this point of view to a degree, saying that the key to NAC is the management of policy and that, to succeed, policy management has to be improved. It cant be the creation of a new island of policy.
Theres also Jason Brooks viewpoint that NAC impedes the development and adoption of new technologies outside of the mainstream and cant give a level of confidence sufficient to generate the cost and work it entails.
As to how successful NAC is in the real world, Ill welcome your reports. Unlike Jason, Im rooting for NAC and I dont see why it cant do good enough. His concern over support for new devices is a reasonable one, but if things develop well, a NAC agent could be a simple thing to implement, and mandatory for market acceptance as a device driver.
Im thinking of standards development in the NAC space, and specifically the IETFs NEA (Network Endpoint Assessment) working group. The groups Overview and Requirements document states:
Sounds like every responsible marketing document for a NAC product.
From the first time I heard about NAC, I realized that standards would be critical. Forcing customers to buy into one vendor whole hog was planning to fail. Effective NAC standards would allow anyone to implement NAC client agent software to work with any NAC back-end system. The vendors realize this and are happy to facilitate it, since the back ends are where all the money is.
The chairs of the working group are from Juniper and Cisco. The Requirements document was written by representatives of Symantec, Intel, Avaya, Cisco and Nevis Networks. In the mailing list discussions I saw someone from IBM, Paul Hoffman of the VPN Consortium and a developer of an open-source project. I dont see anyone from Microsoft yet, but theres every reason to believe theyll support any standards that emerge, especially since theyve already worked for interoperability with Ciscos NAC, and Cisco seems enthusiastic about NEA.
In the short term, theres no question that Jason is right that requiring an agent presents a barrier to entry for devices that are either unconventional or difficult to secure (for instance, Ive heard of companies that have eliminated wireless networks in part because of difficulties with NAC). In the longer term, I dont see why standards-compliant agents shouldnt be easy to write, almost template-driven.
The hard part, as Tardo says, is developing policy for them. But responsible security management will develop policy for such devices anyway. NAC helps to implement it, not the other way around.
Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.
More from Larry Seltzer