Wireless Access Control
CIS Control 15
The processes and tools used to track/control/prevent/correct the security use of wireless local area networks (WLANs), access points, and wireless client systems.
Why is this Critical?
One of the easiest ways for an attacker to exploit an environment is to gain access to an organization’s wireless network. Wireless devices are a convenient vector for attackers to maintain long-term access into the target environment because they do not require direct physical connections.
This CIS Control addresses wireless access control as an effective means to protect organizations from intrusion, data theft, and malware infiltration. Organizations can greatly reduce their wireless security posture by implementing authorized configurations and security profiles for wireless devices, by denying access for unauthorized devices and by performing targeted network vulnerability scanning to detect authorized and unauthorized wireless access points. Knowing who is connected and from where is the key.