IVS-12: Wireless Security

CSF v1.1 References:

Threats Addressed:

Warning icon.

Control is withdrawn in the next version of this control set.

Control Statement

Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following:

  • Perimeter firewalls implemented and configured to restrict unauthorized traffic
  • Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings)
  • User access to wireless network devices restricted to authorized personnel
  • The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.