Wireless Access Security Policy ? Best Practices
Posted by Superadmin on September 09 2022 13:17:33

Wireless Access Security Policy – Best Practices

 

 

Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network. In this article, I will provide security guidance and best practices when deploying or implementing a wireless access point and network. You may use the ideas and recommendations in this article to generate your own wireless access policy for your organization.

Corporate Wireless Access Control

Wireless access on systems utilized for business purposes only should be configured to allow access only to authorized wireless networks. For devices that do not have an essential wireless business purpose, wireless access should be disabled within the hardware configuration such as through the basic input/output system (BIOS) or through the extensible firmware interface. File sharing should be disabled on wireless enabled devices.

Guest Wireless Access Control

Appropriate technical safeguards should be implemented on wireless access points to protect the confidentiality, integrity, and availability of its data and systems. If wireless access is supported in the corporate environment, it should be based on documented implementation and baseline standards. Guest wireless access should be provided to third parties with internet access only. The guest wireless network should be completely segmented from the internal network and does not provide any access to resources. Wireless access to systems containing sensitive information should be protected by authenticating both users and devices.

Vendor Default Settings

Vendor default settings for wireless access points should be changed prior to authorizing the implementation of the access point. Wireless access points should be configured with strong encryption (WPA at a minimum). Wireless access points should be placed in secure locations, such as in a cage or screwed into the ceiling.

Scanning for Rogue Wireless Access Points

Quarterly scans should be performed to identify unauthorized or rogue wireless access points. Appropriate actions should be taken if any unauthorized access points are discovered.

Wireless Access Point Security Checklist

The following controls should be implemented to protect the wireless access network: