What is Network Access Control (NAC)?

Network Access Control (NAC) is a security solution that determines which devices are allowed to access the network, based on predefined rules, authentication and device posture. NAC prevents unauthorised or non-compliant systems from connecting to critical OT or IT networks.

In OT environments, NAC is essential for keeping unauthorised laptops, rogue devices or infected equipment out of industrial networks β€” without endangering availability.


🧠 What does NAC do?

  1. Identifies who or what is attempting to connect
  2. Verifies that the device complies with policy (e.g. antivirus active, firmware up to date)
  3. Authorises based on RBAC, MAC address, certificate or device profile
  4. Assigns access to a specific VLAN or blocks access if non-compliant
  5. Monitors devices throughout the entire session (post-connection check)

πŸ”§ NAC in an OT context

Function Application in industrial networks
MAC authentication Only pre-registered OT devices may connect
802.1X integration Authentication of laptops or mobile engineers via certificates
VLAN assignment Unknown devices placed into an isolated β€œquarantine” VLAN
Guest access control Temporary network access for suppliers with logging
Profiler functionality Recognition of PLCs, SCADA, IoT devices via fingerprinting

πŸ›‘οΈ Why NAC matters in OT

Risk without NAC Consequence
Uncontrolled access Rogue Devices and laptops with malware can connect freely
Shadow IT Devices are added without official oversight
Malware spread No quarantine measures available for unknown systems
Compliance issues Failure to meet IEC 62443, NIS2 or ISO 27001 requirements

NAC is a core component of Zero Trust Architecture for OT environments.


πŸ” Integration with other systems

System Integration example
SIEM Logging of NAC events and access requests
Asset Inventory Automatic registration of new devices via the NAC profiler
Firewall Dynamic rules based on NAC status or access policy
Switch / 802.1X Port-based access control with fallback to MAC authentication

βœ… Best practices

Measure Why it matters
Start in a low-impact mode Observe behaviour first without blocking traffic
Use MAC whitelisting in OT Because not all OT devices support 802.1X
Design based on risk profiles E.g. suppliers, engineering laptops, fixed equipment
Combine with physical access control Prevent unwanted access to switch ports
Integrate with anomaly detection Take automated action on suspicious behaviour

πŸ“Œ In summary

Network Access Control (NAC) is the digital gatekeeper of your industrial network. It provides control over who or what may connect, under which conditions and with which rights β€” a must for secure and compliant OT networks.