parallax background

Wireless Access Control

CIS Control 15


The processes and tools used to track/control/prevent/correct the security use of wireless local area networks (WLANs), access points, and wireless client systems.

Why is this Critical?


One of the easiest ways for an attacker to exploit an environment is to gain access to an organization’s wireless network. Wireless devices are a convenient vector for attackers to maintain long-term access into the target environment because they do not require direct physical connections.

This CIS Control addresses wireless access control as an effective means to protect organizations from intrusion, data theft, and malware infiltration. Organizations can greatly reduce their wireless security posture by implementing authorized configurations and security profiles for wireless devices, by denying access for unauthorized devices and by performing targeted network vulnerability scanning to detect authorized and unauthorized wireless access points. Knowing who is connected and from where is the key.

Ready to solve your security needs?

Choose Cyvatar for your managed security outcomes.

Haven't found what you're looking for?

Our team of advisors loves questions. Let us know what problems you are trying to solve and we'll help you find a solution.

Become a Member