Device Posture Check
Secure your network perimeter effectively with Device Posture Check, which assesses device security based on customizable policy restrictions in real-time.
This feature is available in the Premium plan and higher.
The Device Posture Check is a sophisticated security measure integrated into our Client Application, designed to assess the security posture of devices seeking access to the network perimeter in real-time. It employs a comprehensive set of policy restrictions that can be customized to align with organizational security requirements.
How it works
Device Assessment: When a user starts a Client Application, or when a device attempts to connect to the perimeter, the Device Posture Check feature conducts a comprehensive assessment of the device's security posture based on the specified policy restrictions. This assessment is then automatically repeated every 5 minutes, ensuring continuous compliance with your security policies.
Policy Evaluation: The feature evaluates the device's compliance with each policy restriction, determining whether it meets the required security standards.
Access Control: Based on the results of the posture check, the device is either granted or denied access to the perimeter.
Real-time Policy Enforcement: The Device Posture Check feature is continuously monitoring for changes in policy restrictions. If new policies are applied or if existing ones are modified, devices that no longer meet the updated criteria are promptly disconnected from the perimeter.
Centralized Monitoring: Administrators have overview of all devices from Control Panel, with detailed insights into the posture checks perfomed on each device, including historical data.
Available policy restrictions
Real-World Use Cases
Below are practical examples that show how Device Posture Check can enhance security and ensure compliance in various scenarios.
1. Ensuring Compliance for Corporate & BYOD Devices
Whether your organization relies on corporate devices, allows Bring Your Own Device (BYOD), or both, the Device Posture Check continuously assesses every device attempting to access your network perimeter.
Key Benefits:
Reduced Risk: Only compliant devices are allowed to access your network perimeter, minimizing potential vulnerabilities.
Cost Efficiency: By securely enabling BYOD, your organization can reduce hardware costs while maintaining strict security standards.
Seamless Integration: Both corporate and personal devices are managed under a unified security framework, simplifying overall administration.
2. Regulatory Compliance and Audit Readiness
When your organization must adhere to industry regulations (e.g., GDPR, HIPAA, PCI-DSS, SOC2, NIS2), Device Posture Check supports your compliance efforts by continuously enforcing and logging security policies, helping you meet stringent regulatory requirements.
Key Benefits:
Regulatory Adherence: Ensures all devices meet industry-specific security standards.
Audit Readiness: Comprehensive logs facilitate the process of compliance reporting and audits.
Reduced Risk of Non-Compliance: Only compliant devices are granted access, lowering the risk of regulatory breaches.
3. Securing Third-Party and Guest Access
When your organization collaborates with external partners or hosts guest users, Device Posture Check ensures that every connecting device—from vendors to auditors—meets your security standards before accessing your network.
Key Benefits:
Controlled External Access: Only devices that pass the security check can connect, reducing exposure to external threats.
Enhanced Auditability: Detailed logs provide a clear record of compliance for external devices.
Minimized Risk: Protects your network by ensuring that external access is strictly regulated.
4. Securing Access to Sensitive Data
When access to sensitive data or intellectual property is at stake, Device Posture Check ensures that only devices with robust security postures can connect to critical systems.
Key Benefits:
Enhanced Data Protection: Only devices meeting stringent security criteria can access sensitive resources.
Risk Mitigation: Reduces the potential for data breaches by blocking non-compliant devices.
Granular Control: Allows for customized security requirements tailored to high-risk data environments.
5. Adaptive Security in Dynamic Environments
As your organization's security policies evolve, the Device Posture Check continuously evaluates connected devices and enforces updated criteria in real time. This adaptive approach is essential in a dynamic threat landscape.
Key Benefits:
Continuous Security: Automatically adapts to policy changes, ensuring ongoing compliance.
Instant Enforcement: Non-compliant devices are immediately disconnected upon policy updates.
Operational Flexibility: Supports rapid updates to security policies without manual intervention.
Configuration guide
A default security policy, recommended by GoodAccess, is automatically enabled. This policy is designed to only log device posture checks and does not prevent access to the perimeter. It cannot be deleted but can be disabled using the provided switch button.
Log in to the GoodAccess Control Panel, and go to Access Control > Device Posture Check.
Click + Add Policy.
Step 1 - General Settings
Name - Give the policy a name
Description - Optionally write a description
On failure action - Choose the action to take if a device fails the posture check:
Make a log entry
Deny access & make a log entry
On failure message - Choose the message to display if a device fails the posture check:
Default message
Custom message
Enable email notification - Optionally notify the Team Owner or all Admins via email if a device fails the posture check.
Click Continue.
Step 2 - OS Restrictions
Choose the operating system(s) included in this restriction. For each selected OS, specify the policy restrictions.
Click Continue.
Step 3 - Members & Groups
Click + Add to assign individual Members or Groups to apply these restrictions to, or select the option to apply them to all Members of your Team automatically.
Click Continue.
Step 4 - Summary
Make sure to thoroughly review all configured Device Posture Check policy settings and make any necessary adjustments to prevent unintended limitation of access to the perimeter.
Click Submit.
You have now successfully set up your Device Posture Check policy.
Not sure about the configuration?
Get in touch with our Solution Architect who can help you understand how to effectively secure your organization with the Device Posture Check and help you configure it. This service is completely free.
Last updated
Was this helpful?