100% found this document useful (1 vote)
610 views8 pages

Wireless Security Policy Template v1.0

1. This document outlines a wireless security policy to minimize risks associated with wireless network access through controls on unauthorized access, information theft, service theft, and service disruption. 2. The policy defines requirements for authorization, authentication, encryption, access control, client security standards, physical security, logical security, inventory monitoring and audits, and guest access. 3. Compliance with the policy will be enforced through routine monitoring, security audits, and disciplinary action for any violations.

Uploaded by

rsgrthyjh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
610 views8 pages

Wireless Security Policy Template v1.0

1. This document outlines a wireless security policy to minimize risks associated with wireless network access through controls on unauthorized access, information theft, service theft, and service disruption. 2. The policy defines requirements for authorization, authentication, encryption, access control, client security standards, physical security, logical security, inventory monitoring and audits, and guest access. 3. Compliance with the policy will be enforced through routine monitoring, security audits, and disciplinary action for any violations.

Uploaded by

rsgrthyjh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Insert the organization logo by

clicking on the image icon

Wireless Security Policy Template

Date:
Wireless Security Policy Template

Document Control

Document
Wireless Security Policy Template
Title:
Document ID: Version: 0.1
Status: Draft
Publish Date:

Document Review

Version
No. Date Reviewer(s) Remarks
Wireless Security Policy Template

Table of Contents

1. Objective.....................................................................................................4

2. Scope..........................................................................................................4

3. Policy..........................................................................................................4

3.1 General Requirements.........................................................................4

3.2 Authorization........................................................................................4

3.3 Authentication of Wireless Clients.......................................................4

3.4 Encryption............................................................................................5

3.5 Wireless Access Control......................................................................5

3.6 Wireless Client Security Standard.......................................................5

3.7 Wireless Physical Security...................................................................5

3.8 Wireless Logical Security.....................................................................6

3.9 Inventory Monitoring and Audit............................................................6

3.10 Guests and Visitors wireless access....................................................6

3.11 Deployment and Configuration............................................................7

4. Policy Enforcement.....................................................................................7
Wireless Security Policy Template

1. Objective

The objective of this policy is to minimize risks associated with using wireless
network access, and defines controls against the threats of unauthorized
access, theft of information, theft of services, and malicious disruption of
services.

2. Scope

This policy applies to employees, contracted personnel, trainees and any third
parties’ representatives who have been provided access to wireless services
at the organization/ entities.

3. Policy

3.1 General Requirements

3.1.1 Designated Security Team (DST) should ensure that all wireless LAN
accesses have approved security configurations.
3.1.2 DST should Use approved encryption protocols.
3.1.3 Information Technology (IT) team should maintain a hardware address (MAC
address) that can be registered and tracked.

1.
2.

3.2 Authorization

3.2.1 All deployments of wireless network should be controlled and approved by


DST.
Wireless Security Policy Template

3.3 Authentication of Wireless Clients

1.1

1.2

1.3

3.1

3.2

3.3
3.3.1 All access to wireless networks must be authenticated by leveraging the
AAA infrastructure established by the <entity name>.
3.3.2 The strongest form of wireless authentication permitted by the client device
shall be used. For most wireless devices, WPA or WPA2 with 802.1x/EAP-
PEAP, Extensible Authentication Protocol – Transport Layer Security (EAP /
TLS) must be used. WPA2 is preferred wherever possible unless there is a
technological limitation. Minimum of 128-bit encryption must be used.
Technological Limitations should be resolved as soon as possible, and
periodic review and monitoring should be performed.
3.3.3 WPA keys shall be changed, after a known or suspected compromise, or
when there are personnel changes.
3.3.4 Factory default WPA keys shall be changed before deployment.

3.4 Encryption

3.4

3.4.1 The strongest form of wireless encryption permitted by the client device shall
be used, WPA using TKIP encryption or WPA2 using AES-CCM encryption
must be used.
3.4.2 Wireless equipment that does not support at least 128-bit key encryption shall
not be used.

3.5 Wireless Access Control.

3.5.1 Direct or remote access to the <entity name> network should be in


accordance with Access Control and physical Security Policy.
3.5.2 Unnecessary protocols shall be blocked.
Wireless Security Policy Template

3.5.3 File sharing on wireless client devices shall be disabled.


3.5.4 Service set IDs (SSIDs) must be changed from the factory default to
something that is meaningless to outsiders. SSID character strings must not
reflect company Name, location, or product being used.
3.5.5 Broadcast mode of SSIDs shall be disabled.
3.5.6 The wireless network shall be configured with the longest beacon interval.
3.5.7 The wireless solution connected to the <entity name> network should be
secured by network firewall.

3.6 Wireless Client Security Standard

3.6.1 <entity name> team should ensure that all wireless clients must have
security-related operating system patches applied.
3.6.2 The wireless client must comply with <entity name> security policy before
network access granted by implementing a Network Access Control (NAC).
3.6.3 The wireless solution should secure in such a way that can:

 Detect and Disable Rogue APS.


 Protect from Denial of Service and Impersonation
 Protect Man-in-Middle.

3.7 Wireless Physical Security

3.7.1 The physical area where the wireless LAN is to be deployed should be
identified and documented.
3.7.2 Access points shall be physically secured upon proper configuration to
prevent tampering and reprogramming (i.e., to prevent unauthorized physical
access).
3.7.3 Access points shall be placed in secure areas, such as high on a wall, in a
wiring closet, or in a locked enclosure to prevent unauthorized physical
access and user manipulation. Access points shall not be placed in easily
accessible public locations.
3.7.4 In areas where utilization is not required on 24/7 basis, access points shall be
turned off during all hours during which they are not used (e.g., after hours
and on weekends) to minimize potential exposure to malicious activity.
3.7.5 In the event of resetting function for an access point is used, the device must
be restored to the latest security settings.
3.7.6 All security settings and baseline configurations shall be backed up and
stored securely.
3.7.7 Access points signals range must be undetectable outside the <entity name>
premises boundaries.
Wireless Security Policy Template

3.8 Wireless Logical Security

3.8.1 All insecure and nonessential management protocols such as (Hypertext


Transport Protocol (HTTP) and Simple Network Management Protocol
(SNMP)) shall be disabled.
3.8.2 If SNMP is turned on for management purposes, the SNMP community
strings must be changed from their manufacturer default to unique and
difficult to guess strings. SNMPv3 and/or SSL/TLS for Web-based
management of access points should be utilized
3.8.3 When disposing any wireless equipment, it shall be ensured that all
configurations and security settings are erased completely.
3.8.4 Placement of access points and channel assignments shall be such that
coverage/throughput is maximized while interference (denial of service) is
kept to a minimum between different access points or WLANs.

3.9 Inventory Monitoring and Audit

3.9.1 All wireless connections shall be routinely monitored, and security audits
performed to verify the compliance with this policy, access points and
wireless devices are authorized, and to identify unauthorized activity.
3.9.2 Access logs and system audit trails shall be enabled at the access point and
reviewed regularly.
3.9.3 Intrusion Detection Systems (IDS) should be deployed on the wireless
network to report suspected activities.
3.9.4 Network vulnerability scanner should be deployed on the wireless network to
report threats and vulnerability.

3.10 Guests and Visitors wireless access

3.10.1 Deploy an untrusted wireless access point for guests and visitors not
connected to <entity name> network.
3.10.2 Deploy for a Virtual Local Area Network (VLAN) separated and unrouted in
the <entity name> network for the guests and visitor’s wireless network.
3.10.3 Allow guests and visitors to access internet only.

3.11 Deployment and Configuration

3.11.1 Wireless access points (WAP’s) should be deployed and setup by the IT
team and approved by DST.

4. Policy Enforcement

4.1 Policy document sponsor and owner: <Head of Cyber Security Department>.
Wireless Security Policy Template

4.2 Policy implementation and enforcement: <Department Concerned with


Information Technology>.

4.3 Any violation of this policy may subject the offender to disciplinary action as per
the procedures followed in <entity name>.

-End of the Document-

You might also like