Skip to content

Latest commit

 

History

History
53 lines (32 loc) · 2.97 KB

Wireless_Communication_Standard.md

File metadata and controls

53 lines (32 loc) · 2.97 KB
  1. Overview

See Purpose.

  1. Purpose

This standard specifies the technical requirements that wireless infrastructure devices must satisfy to connect to a [ORG’S NAME] network. Only those wireless infrastructure devices that meet the requirements specified in this standard or are granted an exception by the InfoSec Team are approved for connectivity to a [ORG’S NAME] network.

Network devices including, but not limited to, hubs, routers, switches, firewalls, remote access devices, modems, or wireless access points, must be installed, supported, and maintained by an Information Security consultant approved support organization.

  1. Scope

This policy applies to employees, contractors, interns, vendors and agents works in or with [ORG’S NAME] and its subsidiaries, including all personnel that maintain a wireless infrastructure device on behalf of [ORG’S NAME], must comply with this standard. This standard applies to wireless devices that make a connection the network and all wireless infrastructure devices that provide wireless connectivity to the network.

  1. Standard

4.1 General Requirements

All wireless infrastructure devices that connect to a [ORG’S NAME] network or provide access to [ORG’S NAME] Confidential, [ORG’S NAME] Highly Confidential, or [ORG’S NAME] Restricted information must:

• Use Extensible Authentication Protocol-Fast Authentication via Secure Tunneling (EAP-FAST), Protected Extensible Authentication Protocol (PEAP), or Extensible Authentication Protocol-Translation Layer Security (EAP-TLS) as the authentication protocol.

• Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption System (AES) protocols with a minimum key length of 256 bits.

• All Bluetooth devices must use Secure Simple Pairing with encryption enabled.

4.2 Guests and Isolated Wireless Device Requirements

• Guests’ WiFi Service Set Identifier (SSID) must be different from [ORG’S NAME] production device SSID.

• Broadcast of guests’ network must be isolated from the [ORG’S NAME]’s network.

4.3 Home Wireless Device Requirements

All home wireless infrastructure devices that provide direct access to a [ORG’S NAME] network, such as those behind Enterprise Teleworker (ECT) or hardware VPN, must adhere to the following:

• Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST, PEAP, or EAP-TLS

• When enabling WPA-PSK, configure a complex shared secret key (at least 20 characters) on the wireless client and the wireless access point

• Disable broadcast of SSID

• Change the default SSID name

• Change the default login and password

I have read [ORG’S NAME]’s Wireless Communication Standard and agree to abide by it as consideration for my continued employment by [ORG’S NAME]. I understand that violation of any above policies may result in my termination.

_____________________ User Signature

_____________________ Date