2.3.2 For wireless environments connected to the CDE or transmitting account data, wireless encryption keys are changed when personnel with knowledge of the keys leave the company or the role for which the keys were used changes.
Defined Approach Requirements
2.3.2 For wireless environments connected to the CDE or transmitting account data, wireless encryption keys are changed when personnel with knowledge of the keys leave the company or the role for which the keys were used changes.
Customized Approach Objective
Wireless encryption keys are changed when the risk of their exposure increases.
Defined Approach Testing Procedures
2.3.2.a Examine policies and procedures to verify they define the following:
- Procedures for changing wireless encryption keys when personnel with knowledge of the keys leave the company or the role for which the keys were used changes.
- The frequency of changing encryption keys.
2.3.2.b Interview personnel and examine records to verify that encryption keys are changed when personnel with knowledge of the keys leave the company or the role for which the keys were used changes.
Purpose
Changing wireless encryption keys when individuals with knowledge of the keys leave the organization or change positions helps to ensure that the keys are known only to authorized personnel.
Good Practice
Entities should also change encryption keys when they suspect the keys may have been disclosed to unauthorized individuals or otherwise compromised.
Individuals with knowledge of encryption keys include employees, contractors, and service providers.
purpose
Encrypt authentication and transmission of wireless traffic.
whats required for compliance
- Implement strong encryption (WPA2/WPA3, TLS) for wireless authentication and data
- Disable WEP and insecure protocols
compliance strategies
- 802.1X authentication
- Certificate-based wireless access
- Regular wireless penetration testing
typical policies procedures
- Wireless Encryption Policy
- Wireless Security Configuration Standard
common pitfalls failures
- Use of WEP or weak encryption
- Lack of wireless segmentation
type
Technical Control
difficulty
High
key risks
- Eavesdropping and credential theft
product vendor recommendations
- Enterprise wireless solutions with 802.1X (Aruba, Cisco)
- Wireless intrusion prevention systems
Eligible SAQ
- SAQ-A-EP
- SAQ-C
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy