Skip to content

Commit

Permalink
Update network-management.md
Browse files Browse the repository at this point in the history
  • Loading branch information
adonm committed Aug 30, 2023
1 parent 8704125 commit 302f06b
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/guidelines/network-management.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ It's strongly recommended to transition from traditional VPNs to modern Secure S
- Network hardware vendors ([Check Point Harmony Connect](https://www.checkpoint.com/harmony/connect-sase/)[Cisco Secure Access](https://www.cisco.com/site/us/en/products/security/secure-access/index.html)[FortiSASE](https://www.fortinet.com/products/sase),  [Palo Alto Prisma SASE](https://www.paloaltonetworks.com/sase/access))
- Virtual network vendors ([Claroty SRA](https://claroty.com/industrial-cybersecurity/sra), [Teleport (open-source with self-hosted capability)](https://goteleport.com)[Netskope SASE](https://www.netskope.com/solutions/secure-access-service-edge)[Zscaler SASE](https://www.zscaler.com/capabilities/secure-access-service-edge))

These platforms all incorporate zero trust and policy-based access logging and management out of the box and are strongly recommended for where direct network access to legacy systems is still required. All vendors, contractors and identities external to an organisation should have access controlled via such a platform to avoid third party persistent remote access (e.g. TeamViwer, LogMeIn, AnyDesk) being utilised that may not adhere to an organisations Identity and Access Management policies and procedures.
These platforms all incorporate zero trust and policy-based access logging and management out of the box and are strongly recommended for where direct network access to legacy systems is still required. All vendors, contractors and identities external to an organisation should have access controlled via such a platform to avoid third party persistent remote access (e.g. TeamViewer, LogMeIn, AnyDesk) being utilised that may not adhere to an organisations Identity and Access Management policies and procedures.

## Observability & Manageability

Expand Down

0 comments on commit 302f06b

Please sign in to comment.