

To mitigate this risk, you must be able to isolate the devices you trust, and restrict their ability to receive unsolicited network traffic from untrusted devices. These untrustworthy devices both on and outside of your physical network must not be permitted to access your organization's devices except where it's truly required. Because you don't manage those devices, you can't trust them to be free of malicious software, maintained with the latest security updates, or in any way in compliance with your organization's security policies. You also likely have partners, vendors, or contractors who attach devices that aren't owned by your organization to your network. Your organizational network likely has a connection to the Internet.
