Validates that network access and segmentation controls enforce trust boundaries under realistic abuse and lateral-movement scenarios.
•
NAC enforcement - posture bypass, MAC spoofing, rogue device insertion
•
Guest isolation - guest-to-corporate traversal, DHCP and routing path abuse
•
VLAN segmentation - VLAN hopping, broadcast leakage, cross-segment discovery
•
Wireless security - evil-twin detection, encryption downgrade, rogue AP association
•
Lateral containment - blast-radius reduction, trusted-system pivot abuse, east-west restriction