11.2.2 An inventory of authorized wireless access points is maintained, including a documented business justification.
Defined Approach Requirements
11.2.2 An inventory of authorized wireless access points is maintained, including a documented business justification.
Customized Approach Objective
Unauthorized wireless access points are not mistaken for authorized wireless access points.
Defined Approach Testing Procedures
11.2.2 Examine documentation to verify that an inventory of authorized wireless access points is maintained, and a business justification is documented for all authorized wireless access points.
Purpose
An inventory of authorized wireless access points can help administrators quickly respond when unauthorized wireless access points are detected. This helps to proactively minimize the exposure of CDE to malicious individuals.
Good Practice
If using a wireless scanner, it is equally important to have a defined list of known access points which, while not attached to the company's network, will usually be detected during a scan. These non-company devices are often found in multi-tenant buildings or businesses located near one another. However, it is important to verify that these devices are not connected to the entity's network port or through another network-connected device and given an SSID resembling a nearby business. Scan results should note such devices and how it was determined that these devices could be "ignored." In addition, detection of any unauthorized wireless access points that are determined to be a threat to the CDE should be managed following the entity's incident response plan per Requirement 12.10.1.
purpose
Respond to the detection of unauthorized wireless access points.
compliance strategies
- Incident response for rogue APs
- Immediate removal procedures
typical policies
- Wireless Incident Response Policy
common pitfalls
- Delayed response to rogue APs
- No escalation process
type
Process Control
difficulty
Moderate
key risks
- Prolonged exposure to wireless threats
recommendations
- Automate alerts for unauthorized wireless detection
Eligible SAQ
- SAQ-C
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy