SlideShare a Scribd company logo
1 of 3
Download to read offline
Wireless Communication Standard
1 Overview
The purpose of this standard is to secure and protect the information assets owned by
<Company Name>. <Company Name> provides computer devices, networks, and
other electronic information systems to meet missions, goals, and initiatives.
<Company Name> grants access to these resources as a privilege and must manage
them responsibly to maintain the confidentiality, integrity, and availability of all
information assets.
This standard specifies the technical requirements that wireless infrastructure devices
must satisfy to connect to a <Company Name> network. Only those wireless
infrastructure devices that meet the requirements specified in this standard or are
granted an exception by the Information Security Team are approved for
connectivity to a <Company Name> network.
2 Scope
All employees, contractors, consultants, temporary and other workers at <Company
Name>, including all personnel affiliated with third parties that maintain a wireless
infrastructure device on behalf of <Company Name> must adhere to this standard.
This standard applies to all wireless infrastructure devices that connect to a
<Company Name> network or reside on a <Company Name> site that provide
wireless connectivity to endpoint devices including, but not limited to, laptops,
desktops, cellular phones, and personal digital assistants (PDAs). This includes any
form of wireless communication device capable of transmitting packet data.
The <Company Name> Information Security Team must approve exceptions to this
policy in advance.
3 Statement of Requirements
3.1 General Requirements
All wireless infrastructure devices that connect to a <Company Name> network or
provide access to <Company Name> Confidential, <Company Name> Highly
Confidential, or <Company Name> Restricted information must:
3.1.1 Use Extensible Authentication Protocol-Fast Authentication via Secure
Tunneling (EAP-FAST), Protected Extensible Authentication Protocol
(PEAP), or Extensible Authentication Protocol-Translation Layer Security
(EAP-TLS) as the authentication protocol.
3.1.2 Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption
System (AES) protocols with a minimum key length of 128 bits.
2
3.2 Lab and Isolated Wireless Device Requirements
3.2.1 Lab device Service Set Identifier (SSID) must be different from <Company
Name> production device SSID.
3.2.2 Broadcast of lab device SSID must be disabled.
3.3 Home Wireless Device Requirements
All home wireless infrastructure devices that provide direct access to a <Company
Name> network, such as those behind Enterprise Teleworker (ECT) or hardware
VPN, must adhere to the following:
3.3.1 Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST,
PEAP, or EAP-TLS
3.3.2 When enabling WPA-PSK, configure a complex shared secret key (at least
20 characters) on the wireless client and the wireless access point
3.3.3 Disable broadcast of SSID
3.3.4 Change the default SSID name
3.3.5 Change the default login and password
4 References
In support of this standard, the following policies, guidelines, and resources are
included:
Information Sensitivity Policy
Wireless Communication Policy
5 Enforcement
This standard is part of the Wireless Communication Policy and failure to conform to
the standard is a violation of the policy. Any employee found to have violated the
policy may be subject to disciplinary action, up to and including termination of
employment. Any violation of the policy by a temporary worker, contractor or
vendor may result in the termination of their contract or assignment with <Company
Name>.
6 Definitions
Term Definition
3
AES Advanced Encryption System
<Company Name>
network
A wired or wireless network including indoor, outdoor, and
alpha networks that provide connectivity to corporate services.
Corporate connectivity
A connection that provides access to a <Company Name>
network.
EAP-FAST
Extensible Authentication Protocol-Fast Authentication via
Secure Tunneling: authentication protocol for wireless
networks.
EAP-TLS
Extensible Authentication Protocol-Translation Layer
Security, used to create a secured connection for 802.1X by
pre-installing a digital certificate on the client computer.
Enterprise Class
Teleworker (ECT)
An end-to-end hardware VPN solution for teleworker access
to the <Company Name> network.
Information assets
Information that is collected or produced and the underlying
hardware, software, services, systems, and technology that is
necessary for obtaining, storing, using, and securing that
information which is recognized as important and valuable to
an organization.
PEAP
Protected Extensible Authentication Protocol, a protocol used
for transmitting authentication data, including passwords, over
802.11 wireless networks
Service Set Identifier
(SSID)
A set of characters that give a unique name to a wireless local
area network.
TKIP
Temporal Key Integrity Protocol, an encryption key that's part
of WPA.
WPA-PSK WiFi Protected Access pre-shared key
7 Revision History
Date of
Change
Responsible Summary of Change

More Related Content

What's hot

Firewall
FirewallFirewall
FirewallApo
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architecturesArun Mahajan
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 

What's hot (19)

Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall
FirewallFirewall
Firewall
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Wireless security
Wireless securityWireless security
Wireless security
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 

Similar to Wireless communication standard

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Network Support Services
Network Support ServicesNetwork Support Services
Network Support ServicesElena Benson
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for HealthcareSteve Dunn
 

Similar to Wireless communication standard (20)

CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Network Support Services
Network Support ServicesNetwork Support Services
Network Support Services
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
SECURE Out-of-Band Management
SECURE Out-of-Band ManagementSECURE Out-of-Band Management
SECURE Out-of-Band Management
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Wireless communication standard

  • 1. Wireless Communication Standard 1 Overview The purpose of this standard is to secure and protect the information assets owned by <Company Name>. <Company Name> provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. <Company Name> grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets. This standard specifies the technical requirements that wireless infrastructure devices must satisfy to connect to a <Company Name> network. Only those wireless infrastructure devices that meet the requirements specified in this standard or are granted an exception by the Information Security Team are approved for connectivity to a <Company Name> network. 2 Scope All employees, contractors, consultants, temporary and other workers at <Company Name>, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of <Company Name> must adhere to this standard. This standard applies to all wireless infrastructure devices that connect to a <Company Name> network or reside on a <Company Name> site that provide wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones, and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data. The <Company Name> Information Security Team must approve exceptions to this policy in advance. 3 Statement of Requirements 3.1 General Requirements All wireless infrastructure devices that connect to a <Company Name> network or provide access to <Company Name> Confidential, <Company Name> Highly Confidential, or <Company Name> Restricted information must: 3.1.1 Use Extensible Authentication Protocol-Fast Authentication via Secure Tunneling (EAP-FAST), Protected Extensible Authentication Protocol (PEAP), or Extensible Authentication Protocol-Translation Layer Security (EAP-TLS) as the authentication protocol. 3.1.2 Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption System (AES) protocols with a minimum key length of 128 bits.
  • 2. 2 3.2 Lab and Isolated Wireless Device Requirements 3.2.1 Lab device Service Set Identifier (SSID) must be different from <Company Name> production device SSID. 3.2.2 Broadcast of lab device SSID must be disabled. 3.3 Home Wireless Device Requirements All home wireless infrastructure devices that provide direct access to a <Company Name> network, such as those behind Enterprise Teleworker (ECT) or hardware VPN, must adhere to the following: 3.3.1 Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST, PEAP, or EAP-TLS 3.3.2 When enabling WPA-PSK, configure a complex shared secret key (at least 20 characters) on the wireless client and the wireless access point 3.3.3 Disable broadcast of SSID 3.3.4 Change the default SSID name 3.3.5 Change the default login and password 4 References In support of this standard, the following policies, guidelines, and resources are included: Information Sensitivity Policy Wireless Communication Policy 5 Enforcement This standard is part of the Wireless Communication Policy and failure to conform to the standard is a violation of the policy. Any employee found to have violated the policy may be subject to disciplinary action, up to and including termination of employment. Any violation of the policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with <Company Name>. 6 Definitions Term Definition
  • 3. 3 AES Advanced Encryption System <Company Name> network A wired or wireless network including indoor, outdoor, and alpha networks that provide connectivity to corporate services. Corporate connectivity A connection that provides access to a <Company Name> network. EAP-FAST Extensible Authentication Protocol-Fast Authentication via Secure Tunneling: authentication protocol for wireless networks. EAP-TLS Extensible Authentication Protocol-Translation Layer Security, used to create a secured connection for 802.1X by pre-installing a digital certificate on the client computer. Enterprise Class Teleworker (ECT) An end-to-end hardware VPN solution for teleworker access to the <Company Name> network. Information assets Information that is collected or produced and the underlying hardware, software, services, systems, and technology that is necessary for obtaining, storing, using, and securing that information which is recognized as important and valuable to an organization. PEAP Protected Extensible Authentication Protocol, a protocol used for transmitting authentication data, including passwords, over 802.11 wireless networks Service Set Identifier (SSID) A set of characters that give a unique name to a wireless local area network. TKIP Temporal Key Integrity Protocol, an encryption key that's part of WPA. WPA-PSK WiFi Protected Access pre-shared key 7 Revision History Date of Change Responsible Summary of Change