CSC V7 control 15.1 – Maintain an Inventory of Authorized Wireless Access Points Overview CSC V7 control 15.1 recommends that organisations “Maintain an inventory of authorized wireless access points connected to the wired...
CSC V7 control 15.2 – Detect Wireless Access Points Connected to the Wired Network Overview CSC V7 control 15.2 recommends that organisations “Configure network vulnerability scanning tools to detect and alert on unauthorized wireless...
CSC V7 control 15.3 – Use a Wireless Intrusion Detection System Overview CSC V7 control 15.3 recommends that organisations “Use a wireless intrusion detection system (WIDS) to detect and alert on...
CSC V7 control 15.4 – Disable Wireless Access on Devices if Not Required Overview CSC V7 control 15.4 recommends that organisations “Disable wireless access on devices that do not have a business purpose...
CSC V7 control 15.5 – Limit Wireless Access on Client Devices Overview CSC V7 control 15.5 recommends that organisations “Configure wireless access on client machines that do have an essential wireless...
CSC V7 control 15.6 – Disable Peer-to-peer Wireless Network Capabilities on Wireless Clients Overview CSC V7 control 15.6 recommends that organisations “Disable peer-to-peer (adhoc) wireless network capabilities on wireless clients. Note CSC V7...
CSC V7 control 15.7 – Leverage the Advanced Encryption Standard (AES) to Encrypt Wireless Data Overview CSC V7 control 15.7 recommends that organisations “Leverage the Advanced Encryption Standard (AES) to encrypt wireless data in transit....
CSC V7 control 15.8 – Use Wireless Authentication Protocols that Require Mutual, Multi-Factor Authentication Overview CSC V7 control 15.8 recommends that organisations “Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport...
CSC V7 control 15.9 – Disable Wireless Peripheral Access of Devices Overview CSC V7 control 15.9 recommends that organisations “Disable wireless peripheral access of devices (such as Bluetooth and NFC), unless...
CSC V7 control 14.4 – Encrypt All Sensitive Information in Transit Overview CSC V7 control 14.4 recommends that organisations “Encrypt all sensitive information in transit. Note CSC V7 places this control...