S 4.293 Secure operation of hotspots

Initiation responsibility: Head of IT, Top Management

Implementation responsibility: IT Security Officer, Head of IT, Administrator

The purpose of a hotspot is generally to permit (unknown) users easy access to the internet. In order to be able to operate a hotspot securely over the long term, successful authentication of all users is necessary on the hotspot. Commonly used and (for the most part) secure methods include, for example:

Hotspot operators should offer suitable authentication procedures.

The following security safeguards should also be implemented when operating hotspots:

In addition, hotspot operators should check their logs regularly to see if any irregular activities were recorded, for example if the number of users is higher than the number of guests logged in.

Providers of public hotspots must also follow the corresponding legal and regulatory specifications.

The users must be notified in advance and in a suitable manner of the terms of use. The terms of use should inform the users as to whether using the hotspot is free of charge or subject to a charge (including specification of corresponding prices), but also which services, and especially which security mechanisms, are offered when using the hotspot. The users must confirm that they have read the terms of use and accept them. When web authentication is used, the terms of use could be displayed on a website, for example, and the users could then accept the terms of use via this web page.

The security policies to be observed by the hotspot users are described in S 2.389 Secure use of hotspots.

Review questions: