Information Technology Security. Advice from Experts
Management countermeasures set the stage for all that happens on the WLAN. Based on policy, these countermeasures should work to:
-
Identify who may use WLAN technology in a corporation and limit access by function, location, and workgroup or security clearance.
-
Identify whether Internet access is required beyond the WLAN network. Some WLAN applications are for intranets only.
-
Describe who can install access points and other wireless equipment. With the ease of installation and configurations, it is important to verify proper use of the technology.
-
Provide limitations on the location of and physical security for access points to minimize the propagation (distance and availability) of the signal.
-
Describe the type of information that may be sent over wireless links to reduce compromises of sensitive data.
-
Describe conditions under which wireless devices are allowed.
-
Define standard security settings for access points to reduce risks and establish uniform configurations standards.
-
Describe limitations on how the wireless device may be used, such as location in and outside the building and near sensitive areas, to gain access to personal or sensitive data.
-
Describe the hardware and software configuration of all wireless devices.
-
Provide guidelines on reporting losses of wireless devices and security incidents
-
Provide guidelines for the protection of wireless clients to minimize/ reduce theft.
-
Provide guidelines on the use of encryption and key management systems.
-
Define the frequency and scope of security assessments to include access point discovery.