Under active development Content is continuously updated and improved

SI-4(14)Information System Monitoring

PBMM (P2)
Secret (P2)
Operational

>Control Description

INFORMATION SYSTEM MONITORING | WIRELESS INTRUSION DETECTION The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.

>Supplemental Guidance

Wireless signals may radiate beyond the confines of organization-controlled facilities. Organizations proactively search for unauthorized wireless connections including the conduct of thorough scans for unauthorized wireless access points. Scans are not limited to those areas within facilities containing information systems, but also include areas outside of facilities as needed, to verify that unauthorized wireless access points are not connected to the systems.

Related controls: AC-18, IA-3.

Ask AI

Configure your API key to use AI features.