Under active development Content is continuously updated and improved

NO-16Disable Rogue Wireless Access Points

>Control Description

Organization employs mechanisms to detect and disable the use of unauthorized wireless access points.

Theme

Technology

Type

Detective

Policy/Standard

Network Security Standard

>Implementation Guidance

1. Ensure a process is defined and documented to detect unauthorized wireless access points. 2. Ensure network monitoring software is in place to identify unauthorized wireless access points send alerts to the appropriate personnel. 3. Ensure that alerts are regularly reviewed, and if necessary, actions are taken to fix any issues.

>Testing Procedure

1. Inspect and validate that a process is defined and documented to detect unauthorized wireless access points. 2. Validate the configuration of network monitoring software to check if it detects unauthorized wireless access points send alerts to the appropriate personnel. 3. Validate sample alerts and inspect whether they were reviewed, and if necessary, actions were taken to fix any issues.

>Audit Artifacts

E-NO-01
E-NO-19
E-NO-20

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.