Episode 49 — Apply NAC, DNS, and NTP Protections to Prevent Control-Plane Attacks

 This episode explains how Network Access Control, DNS, and NTP protections defend the control plane that everything else depends on, a concept ISSAP often targets because these services are easy to overlook until an attacker uses them to redirect traffic, poison trust, or disrupt operations. You’ll learn how NAC enforces who and what is allowed on the network, how DNS protections reduce spoofing and manipulation, and how NTP integrity supports logging, authentication, and forensic timelines. We’ll cover practical architecture choices like authenticated device onboarding, DNS filtering and logging, secure resolvers, time source hierarchy, and monitoring that detects anomalies such as sudden resolver changes or time drift across critical systems. Examples include preventing rogue devices from joining sensitive VLANs, mitigating DNS tunneling indicators, and ensuring certificate validation and log correlation do not fail due to inaccurate time. Troubleshooting topics include NAC bypass through unmanaged ports, inconsistent DNS settings that create blind spots, and fragile time configurations that cause intermittent auth failures and unreliable evidence during incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 49 — Apply NAC, DNS, and NTP Protections to Prevent Control-Plane Attacks
Broadcast by