S 2.381 Determining a strategy for the use of WLAN

Initiation responsibility: IT Security Officer, Head of IT, Top Management

Implementation responsibility: Head of IT, IT Security Officer

Before WLANs are used in an organisation, the general strategy taken by the organisation in terms of WLAN usage must be specified. In particular, it must be clarified in which organisational units, for which applications, and for what purpose WLANs will be used as well as which information is permitted to be communicated in a WLAN. The areas for which the WLANs will be set up (this could be, for example, environments in which the users often move within certain areas) as well as the areas in which no WLAN at all is permitted to be available (extending up to active shielding) should also be specified.

WLAN components can be used, for example, to

Wireless networks can be set up with or without connections to other networks, which also has a significant influence on the threat scenario and therefore on the security safeguards to be taken as well. Depending on the intended use and environment in which the WLAN is set up, the security safeguards necessary may differ significantly. This must be considered in all cases when formulating the security policies and regulations for WLAN usage. The decisions should be documented together with the reasons for the decisions.

When setting up a wireless network, a significant amount of planning is necessary to achieve the stability, transmission quality, and security required for professional use (see also S 2.383 Selection of a suitable WLAN standard and S 5.140 Setting up a distribution system).

Those responsible for IT as well as the Security Management in an organisation should be completely aware of the fact that many technical aspects in wireless communication systems, and especially in WLANs, are subject to rapid developments and changes. For Security Management and for those responsible for IT, this means on one hand that more expense and effort is generally required to achieve secure operation of the WLAN, and on the other hand that the effectiveness of IT security safeguards must be tested more often than on other systems, and adapted more often to changes.

The following points are important for the secure operation of wireless networks and the IT systems connected to them:

Use of WLAN components

Many IT systems used by end users such as laptops or PDAs contain WLAN functionality that is usually enabled by default. It must be ensured that no "wild" WLAN usage is possible using this functionality, and there must be clear rules stating whether or not it is permitted to use this WLAN functionality (and if yes, under what conditions).

Review questions: