Trust and Identity Management

This section discusses the trust and identity management element of the Cisco Self-Defending Network.

KEY POINT

Businesses need to effectively and securely manage who and what can access the network, as well as when, where, and how that access can occur.

Trust and identity management is critical for organizations. It underpins the creation of any secure network or system by providing or denying access to business applications and networked resources based on a user's specific privileges and rights.

Trust and identity management solutions provide secure network access and admission at any point in the network and isolate and control infected or unpatched devices that attempt to access the network. The three aspects of trust and identity management are trust, identity, and access control, as shown in Figure 10-9 and described in the following sections.

Figure 10-9 Trust and Identity Management

Access Control

Was this article helpful?

0 0

Post a comment