Physical access to the network for users must be assigned based on organizational user credentials (e.g. NAC 802.1x).
CIS Controls. 1.7 Deploy Port Level Access Control. Utilize port level access control, following 802.1x standards, to control which devices can authenticate to the network.
HIPAA Security Rules 164.312(e)(1): Transmission Security: Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
ISO 27001:2013. Annex A - 9.1.2 Users should only have access to the internal network and network services for which they have been explicitly authorized.
NIST 800-53 IA-2 Identification and authentication: The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation