IT SECURITY RESOURCES
Draft Wireless Networks
Security Guidelines
in response to the new
State IT Security Policy on
Wireless Networks
4. Network Security Standard
Wireless Networks
General Controls Guidelines
- Complete a security assessment of the wireless system before production implementation. The assessment should include an evaluation of potential risks to the campus networks that are accessible from a wireless domain
- Maintain a current, documented diagram of the topology of the wireless network
- Perform periodic assessments for access point discovery
- Perform periodic security testing and assessment of the wireless network
- Implement configuration/change control and management to ensure that equipment has the latest software release that includes security enhancements and patches for discovered vulnerabilities
- Implement standardized configurations to maintain wireless network security, to ensure change of default values, and to ensure consistency of operations
- Implement security training to raise awareness about the threats and vulnerabilities inherent in the use of wireless technologies
- Monitor the wireless industry for changes to standards that enhance security features and for the release on new products
- Wireless networks should facilitate some form of cryptographic protocol, where necessary, examples being secure shell (SSH), Transport-Level Security (TLS), Internet Protocol Security (IPsec), or Virtual Private Networks (VPN)
- Use a VPN for any protocol that may include sensitive information
- Additional countermeasures such as strategically locating access points, ensuring firewall filtering, and blocking and the installation of antivirus software should be implemented
- Ensure that all access points are administered from the wired LAN and never the wireless network
Wireless Security Plan
The Wireless Security Plan must do the following:
- Identify who may use the technology
- Identify whether Internet access is required
- Describe who can install access points and other wireless equipment
- Provide guidelines on the location of and physical security for access points
- Describe the type of information that may be sent over wireless links
- Define standard security settings for access points
- Describe limitations on how the wireless devices may be used
- Provide guidelines on reporting wireless security incidents
- Define the frequency and scope of security assessments to include access point discovery
Access Point Configuration
- All default passwords should be changed
- If SNMP is not required, the institution should disable it
- If SNMP is required, institutions should use SMNPv3 or higher
Authentication
- Wireless networks should authenticate the identity of all users, where necessary
Intrusion Detection Systems
- Institutions should monitor wireless networks to identify potentially infected devices