Wireless Security Policy Template v1.0
Wireless Security Policy Template v1.0
Date:
Wireless Security Policy Template
Document Control
Document
Wireless Security Policy Template
Title:
Document ID: Version: 0.1
Status: Draft
Publish Date:
Document Review
Version
No. Date Reviewer(s) Remarks
Wireless Security Policy Template
Table of Contents
1. Objective.....................................................................................................4
2. Scope..........................................................................................................4
3. Policy..........................................................................................................4
3.2 Authorization........................................................................................4
3.4 Encryption............................................................................................5
4. Policy Enforcement.....................................................................................7
Wireless Security Policy Template
1. Objective
The objective of this policy is to minimize risks associated with using wireless
network access, and defines controls against the threats of unauthorized
access, theft of information, theft of services, and malicious disruption of
services.
2. Scope
This policy applies to employees, contracted personnel, trainees and any third
parties’ representatives who have been provided access to wireless services
at the organization/ entities.
3. Policy
3.1.1 Designated Security Team (DST) should ensure that all wireless LAN
accesses have approved security configurations.
3.1.2 DST should Use approved encryption protocols.
3.1.3 Information Technology (IT) team should maintain a hardware address (MAC
address) that can be registered and tracked.
1.
2.
3.2 Authorization
1.1
1.2
1.3
3.1
3.2
3.3
3.3.1 All access to wireless networks must be authenticated by leveraging the
AAA infrastructure established by the <entity name>.
3.3.2 The strongest form of wireless authentication permitted by the client device
shall be used. For most wireless devices, WPA or WPA2 with 802.1x/EAP-
PEAP, Extensible Authentication Protocol – Transport Layer Security (EAP /
TLS) must be used. WPA2 is preferred wherever possible unless there is a
technological limitation. Minimum of 128-bit encryption must be used.
Technological Limitations should be resolved as soon as possible, and
periodic review and monitoring should be performed.
3.3.3 WPA keys shall be changed, after a known or suspected compromise, or
when there are personnel changes.
3.3.4 Factory default WPA keys shall be changed before deployment.
3.4 Encryption
3.4
3.4.1 The strongest form of wireless encryption permitted by the client device shall
be used, WPA using TKIP encryption or WPA2 using AES-CCM encryption
must be used.
3.4.2 Wireless equipment that does not support at least 128-bit key encryption shall
not be used.
3.6.1 <entity name> team should ensure that all wireless clients must have
security-related operating system patches applied.
3.6.2 The wireless client must comply with <entity name> security policy before
network access granted by implementing a Network Access Control (NAC).
3.6.3 The wireless solution should secure in such a way that can:
3.7.1 The physical area where the wireless LAN is to be deployed should be
identified and documented.
3.7.2 Access points shall be physically secured upon proper configuration to
prevent tampering and reprogramming (i.e., to prevent unauthorized physical
access).
3.7.3 Access points shall be placed in secure areas, such as high on a wall, in a
wiring closet, or in a locked enclosure to prevent unauthorized physical
access and user manipulation. Access points shall not be placed in easily
accessible public locations.
3.7.4 In areas where utilization is not required on 24/7 basis, access points shall be
turned off during all hours during which they are not used (e.g., after hours
and on weekends) to minimize potential exposure to malicious activity.
3.7.5 In the event of resetting function for an access point is used, the device must
be restored to the latest security settings.
3.7.6 All security settings and baseline configurations shall be backed up and
stored securely.
3.7.7 Access points signals range must be undetectable outside the <entity name>
premises boundaries.
Wireless Security Policy Template
3.9.1 All wireless connections shall be routinely monitored, and security audits
performed to verify the compliance with this policy, access points and
wireless devices are authorized, and to identify unauthorized activity.
3.9.2 Access logs and system audit trails shall be enabled at the access point and
reviewed regularly.
3.9.3 Intrusion Detection Systems (IDS) should be deployed on the wireless
network to report suspected activities.
3.9.4 Network vulnerability scanner should be deployed on the wireless network to
report threats and vulnerability.
3.10.1 Deploy an untrusted wireless access point for guests and visitors not
connected to <entity name> network.
3.10.2 Deploy for a Virtual Local Area Network (VLAN) separated and unrouted in
the <entity name> network for the guests and visitor’s wireless network.
3.10.3 Allow guests and visitors to access internet only.
3.11.1 Wireless access points (WAP’s) should be deployed and setup by the IT
team and approved by DST.
4. Policy Enforcement
4.1 Policy document sponsor and owner: <Head of Cyber Security Department>.
Wireless Security Policy Template
4.3 Any violation of this policy may subject the offender to disciplinary action as per
the procedures followed in <entity name>.