249 – Locate access points
Summary
The access points must be placed in strategic locations, allowing the network signal to reach only the authorized facilities.
Description
When access points are properly placed help to minimize signal leakage beyond the intended coverage area. This reduces the risk of unauthorized users attempting to connect to the network from outside the properly designated facilities, enhancing overall network security.
Supported In
Advanced: True
References
- CAPEC-619. Signal strength tracking
- CIS-12_2. Establish and maintain a secure network architecture
- NIST80053-AC-18_5. Antennas and transmission power levels
- NYSHIELD-5575_B_6. Personal and private information
- MITRE-M1031. Network intrusion prevention
- PADSS-6_2. For wireless technology, implement strong encryption for authentication and transmission
- CMMC-AC_L2-3_1_14. Remote access routing
- CMMC-SC_L1-3_13_1. Boundary protection
- HITRUST-01_l. Remote diagnostic and configuration port protection
- HITRUST-01_n. Network connection control
- HITRUST-01_o. Network routing control
- HITRUST-08_c. Securing offices, rooms and facilities
- HITRUST-08_f. Public access, delivery and loading areas
- HITRUST-08_g. Equipment siting and protection
- ISO27002-8_21. Security of network services
- OSSTMM3-9_4_1. Wireless security (visibility audit) - Interception
- OSSTMM3-11_13_1. Data networks security - Business grinding
- ISSAF-K_9_1. Network security - Storage Area Network SAN (practices for the data-at-rest)
- PTES-6_7_6_2. Exploitation - Proximity access (attacking the user)
- PTES-7_4_5_2. Post Exploitation - Pillaging (system configuration - configured wireless networks and keys)
- NIST800115-4_4. Wireless scanning
- SWIFTCSC-1_4. Restriction of Internet access
- C2M2-9_2_c. Implement network protections for cybersecurity architecture
- PCI-9_2_3. Physical access controls manage entry into systems containing data
- PCI-11_2_1. Wireless access points are identified and monitored
- SIGLITE-SL_151. Are wireless networking devices connected to networks containing scoped systems and data?
- SIG-N_1_4. Network security
- ISO27001-8_21. Security of network services
- FISMA-AC-18_5. Antennas and transmission power levels
Last updated
2024/01/18