Configure key encryption
Summary
The organization must prefer the use of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods.
Description
WPA2 (Wi-Fi Protected Access 2) is a significant improvement over its predecessor, WPA. WPA2 employs stronger encryption algorithms, making it more resistant to wireless attacks. The implementation of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods is an essential method to establish a secure Wi-Fi network. It ensures strong encryption, and robust authentication.
References
- OWASP10-A5. Security misconfiguration
- NYSHIELD-5575_B_6. Personal and private information
- NYDFS-500_15. Encryption of nonpublic information
- PADSS-2_5. Implement key management processes and procedures for cryptographic keys used for encryption of cardholder data
- PADSS-6_1. The wireless technology must be implemented securely
- PADSS-6_2. For wireless technology, implement strong encryption for authentication and transmission
- CMMC-AC_L2-3_1_17. Wireless access protection
- CMMC-SC_L1-3_13_1. Boundary protection
- CMMC-SC_L2-3_13_10. Key management
- HITRUST-09_m. Network controls
- ISO27002-8_20. Network controls
- OSSTMM3-9_7_4. Wireless security (controls verification) - Integrity
- ISSAF-L_8. Network security - WLAN security (global countermeasures)
- PTES-3_7_1. Identify protection mechanisms - Network based protections
- PTES-6_7_6_1. Exploitation - Proximity access (wifi attacks)
- C2M2-9_5_e. Implement data security for cybersecurity architecture
- PCI-2_3_2. Wireless environments are configured and managed securely
- SIG-N_1_12. Network security
- CWE-1262. Improper access control for register interface
- ISO27001-8_20. Network controls
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan