NO-16—Disable Rogue Wireless Access Points
>Control Description
Theme
Type
Policy/Standard
Network Security Standard>Implementation Guidance
1. Ensure a process is defined and documented to detect unauthorized wireless access points. 2. Ensure network monitoring software is in place to identify unauthorized wireless access points send alerts to the appropriate personnel. 3. Ensure that alerts are regularly reviewed, and if necessary, actions are taken to fix any issues.
>Testing Procedure
1. Inspect and validate that a process is defined and documented to detect unauthorized wireless access points. 2. Validate the configuration of network monitoring software to check if it detects unauthorized wireless access points send alerts to the appropriate personnel. 3. Validate sample alerts and inspect whether they were reviewed, and if necessary, actions were taken to fix any issues.
>Audit Artifacts
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.