Final answer:
To address MAC spoofing and management overhead, the security team should implement a) Implement EAP and RADIUS for stronger authentication before granting full network access. EAP provides an authentication framework that, together with a RADIUS server, ensures only authorized users can access the network and minimizes the risk associated with MAC spoofing.
Step-by-step explanation:
The security team at a multinational cloud services company has implemented basic MAC address filtering to enhance port security, but they are concerned about the risk of MAC spoofing and the overhead of managing a MAC address list. To mitigate these concerns, they are considering stronger authentication measures for users to obtain full network access. The measure they should implement next is a) Implement EAP and RADIUS. Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It works with mechanisms such as RADIUS to provide a robust method of handling the authentication of users on a network.
Implementing EAP in conjunction with a RADIUS server will provide a centralized authentication service. Users must authenticate with the RADIUS server using credentials like a username and password, smart cards, or certificates before they can access the network. This setup enhances security by ensuring that only authorized users can access network resources and reduces the risk of illicit access through MAC address spoofing.
While an Intrusion Detection System (IDS) can monitor for suspicious activities and Virtual LANs (VLANs) can segment network traffic to enhance security, neither directly address the need for stronger authentication like EAP with RADIUS. Port Security Policies can complement this approach by defining what devices are allowed to connect to what ports, but they do not offer authentication services on their own.