13.9
IG3

Deploy Port>Level Access Control

Asset Type: Devices
Security Function: Protect

Description

Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network access control protocols, such as certificates, and may incorporate user and/or device authentication.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Identify systems requiring multi-factor authentication
7
Select and deploy MFA solution
8
Enroll users and distribute authentication factors
9
Test MFA across all identified systems
10
Define access control requirements based on least privilege
11
Implement role-based access control (RBAC)
12
Configure access review and recertification process
13
Monitor and audit privileged access usage

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Rogue Device Connected to Network Switch Port

Confidentiality

An attacker or unauthorized visitor plugs a rogue device into an open Ethernet port in a conference room or office, gaining full network access because no 802.1X port-level authentication is enforced.

Unauthorized Wireless Access Point Bridging to Wired Network

Confidentiality

An employee connects an unauthorized wireless access point to a network port, creating an uncontrolled bridge to the corporate network because port-level access control does not validate connecting devices.

Network Pivot Through Uncontrolled Physical Port

Integrity

An attacker gains physical access to a building and connects a network implant device to an unprotected port, establishing a persistent backdoor for remote access because no port-level authentication exists.

Vulnerabilities (When Safeguard Absent)

No Physical Port Authentication

Without 802.1X or equivalent port-level access control, any device physically connected to a network port is granted access without identity verification, enabling unauthorized network connectivity.

Uncontrolled Network Edge Access Points

Open network ports in accessible locations like conference rooms, lobbies, and shared spaces allow any device to connect and communicate on the network without authentication or authorization.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Access review/recertification records with sign-off Quarterly
Technical Access control configuration evidence (RBAC settings, group memberships) Reviewed quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually