IVS-12: Wireless Security

CSF v1.1 References:

Threats Addressed:

Control Statement

Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following:

  • Perimeter firewalls implemented and configured to restrict unauthorized traffic
  • Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings)
  • User access to wireless network devices restricted to authorized personnel
  • The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network