The SANS ISC shares excellent & in-depth article on 802.1x Wired Access Control best practices to inventory especially for unknown devices & vulnerabilities So why do people want this, and why is it part of the Critical Controls? Because it really is about controlling both your known and unknown inventory. Known devices authenticate properly, […]