Infrastructure Security · IS-Q20B

Bonus Question: Are wireless networks secured through strong encryption, access control, and periodic assessments?

Why This Matters

Wireless networks are common attack vectors. Proper encryption, authentication, and periodic security testing protect data and users from interception and rogue access.

Maturity

0 — Unaware
Open or shared wireless networks with no policy.
1 — Ad Hoc
WPA/WPA2 used without central management.
2 — Defined
Wireless policy approved; secure encryption and MFA enabled.
3 — Managed
Central controller deployed with periodic penetration testing.
4 — Integrated
Guest and corporate networks segregated; logs monitored by SOC.
5 — Optimized
Continuous wireless threat detection and auto-quarantine of rogue devices.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Disable open Wi-Fi; enforce WPA2/WPA3.|
| 1 → 2 |Define wireless policy and enable MFA.|
| 2 → 3 |Deploy controller and test for rogue APs.|
| 3 → 4 |Integrate logs with SIEM and separate guest access.|
| 4 → 5 |Implement automated rogue device mitigation. |

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | Wireless scan | Kismet / Aircrack-ng | Detect rogue APs |
| Monitoring | Wazuh / ELK | Alert on SSID events |
| Policy Mgmt | FreeRADIUS | 802.1X auth |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.23 | | NIST CSF 2.0 | PR.AC / DE.CM | | CERT-In 2022 | Section 18 | | NIRMATA Mapping | IS-Q20B extends Infrastructure Security with wireless network resilience controls. |