S 4.297 Secure operation of WLAN components

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

WLANs are attractive targets for attackers and therefore must be configured very carefully in order to ensure secure operation. All WLAN components must be configured in such a way that they are protected against attacks to the best extent possible. If WLAN components are not configured correspondingly, they must not be enabled and/or connected to the productive environment.

WLAN components requiring protection include the access points, the distribution system, the WLAN clients, the operating systems the WLAN components are operated on, and the protocols used, amongst other things. The following aspects must be taken into consideration in particular:

If possible, a standard configuration should be developed for the WLAN components used reflecting the specifications in the WLAN security policy. This makes it easier to provide support for numerous devices and change the configurations. At the same time, deviations from the intended configuration can be identified faster.

It makes sense to use a WLAN management solution ensuring efficient configuration of the access points. Access points and the active components of the distribution system should still remain integrated into the network management system and monitoring must also still be possible. After all, it should still be possible to check the availability of the authentication server through the management system. It may be necessary to expand a network management system already in use by adding a WLAN management module.

Connections of external access points or manipulations to the switches of the distribution system should be detected by the WLAN management system. The affected network port of the distribution switch should be blocked immediately in such cases.

Likewise, the configurations of the access points and of the distribution system should be checked regularly. To check the configuration, the system configuration currently in use must be compared to a documented and validated configuration. If any unconfirmed changes are found, the systems must be examined and possibly even switched off and checked for evidence of an attack.

For the secure operation of WLAN components, both the basic configuration specified on the basis of the WLAN security policy as well as all changes made must be documented carefully so that they can be restored at any time. In addition to the documentation of the security configuration, documentation of the firmware versions of the access points and documentation of location-specific configurations must also be available.

Review questions: