How to mitigate the risk of malicious devices added to a network?

Hi. Just wanted to point out another recent thread on this topic. In particular, @danderson’s reply here: