Home / Companies / Tailscale / Blog / Post Details
Content Deep Dive

Device Posture Management in Tailscale: Restrict Access for Non-Compliant Devices

Blog post from Tailscale

Post Details
Company
Date Published
Author
Tinku Thomas and Anton Tolchanov and Kristoffer Dalby and James Sanderson and Paul Scott and Ross Zurowski and Ben Lee-Cohen
Word Count
677
Language
-
Hacker News Points
-
Summary

Tailscale's Device Posture Management, now in beta, allows users to restrict access for non-compliant devices by managing device attributes and integrating third-party systems within a Tailscale network, or tailnet. This feature enables defining "postures," or sets of device attribute assertions, to enforce security policies, such as allowing access only from devices with specific operating systems or endpoint detection and response (EDR) scores. Posture attributes can be customized using the Posture Attributes API, accommodating additional conditions in access control lists (ACLs). Integrations with systems like Crowdstrike Falcon allow for policy configurations based on Zero Trust Assessment (ZTA) scores, ensuring that network access is granted only to devices meeting specific security criteria. This approach enhances tailnet security by providing a straightforward method to limit access to devices that comply with an organization’s defined requirements.