WithPCI Logo
WithPCI.com

11.2.2 An inventory of authorized wireless access points is maintained, including a documented business justification.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

11.2.2 An inventory of authorized wireless access points is maintained, including a documented business justification.

Customized Approach Objective

Unauthorized wireless access points are not mistaken for authorized wireless access points.

Defined Approach Testing Procedures

11.2.2 Examine documentation to verify that an inventory of authorized wireless access points is maintained, and a business justification is documented for all authorized wireless access points.

Purpose

An inventory of authorized wireless access points can help administrators quickly respond when unauthorized wireless access points are detected. This helps to proactively minimize the exposure of CDE to malicious individuals.

Good Practice

If using a wireless scanner, it is equally important to have a defined list of known access points which, while not attached to the company's network, will usually be detected during a scan. These non-company devices are often found in multi-tenant buildings or businesses located near one another. However, it is important to verify that these devices are not connected to the entity's network port or through another network-connected device and given an SSID resembling a nearby business. Scan results should note such devices and how it was determined that these devices could be "ignored." In addition, detection of any unauthorized wireless access points that are determined to be a threat to the CDE should be managed following the entity's incident response plan per Requirement 12.10.1.

purpose

Respond to the detection of unauthorized wireless access points.

compliance strategies

  • Incident response for rogue APs
  • Immediate removal procedures

typical policies

  • Wireless Incident Response Policy

common pitfalls

  • Delayed response to rogue APs
  • No escalation process

type

Process Control

difficulty

Moderate

key risks

  • Prolonged exposure to wireless threats

recommendations

  • Automate alerts for unauthorized wireless detection

Eligible SAQ

  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy