IVS-12: Wireless Security
Control Family:
Threats Addressed:
Control Statement
Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following:
- Perimeter firewalls implemented and configured to restrict unauthorized traffic
- Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings)
- User access to wireless network devices restricted to authorized personnel
- The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network