S 5.141 Regular security checks of WLANs
Initiation responsibility: Head of IT, IT Security Officer
Implementation responsibility: Administrator
A WLAN security check should be performed regularly, but at least once per month.
WLANs should be checked regularly with WLAN analysers and network sniffers to see if there are any security gaps such as weak passwords, inadequate encryption, or an enabled SSID broadcast. The check should also look for WLANs installed without authorisation.
Network analysis programs
Specific tools for monitoring and analysing the quality of service and level of security are helpful not only in WLANs, but also in other networks. For secure operation of a WLAN, it is particularly important to check the extent to which the prescribed security policies are being followed and the overall availability of the WLAN. The latter also includes performance measurements and error analyses. Tools providing a list of all active WLAN subscribers and of any subscribers recognised recently are also helpful.
Network analysis or sniffer programs read data streams and examine the data packets transmitted for different, variable criteria. For example, such a program can search for certain patterns in the data packets or evaluate routing information.
Network analysis tools should be used regularly to
- look for unauthorised WLANs on the property of the organisation,
- check regularly if all necessary security mechanisms have been activated, and
- detect dead zones and evaluate the signal quality of wireless networks.
Monitoring the WLAN infrastructure
The simplest way to monitor the WLAN infrastructure is to perform a spot check of a location using a WLAN client equipped with special software. Access points installed and operated without authorisation can be detected this way.
Better control can be obtained using a WLAN management system that can be used in order to perform the following activities at regular intervals:
- detection of external devices, especially of external access points
- performance of wireless site surveys, i.e. surveys to obtain information on the coverage, data rates, bandwidth, QoS, etc., of a WLAN
- recording login times
- monitoring the configuration of WLAN network elements
Use of a wireless intrusion detection system
When planning an access point based wireless intrusion detection system (IDS), it must first be specified if a separate measurement infrastructure will be built or if the access points and WLAN clients in the live network will be switched to a measurement mode at certain intervals. If it is impossible to take measurements everywhere in the coverage area to be monitored, attacks in the WLAN at the wireless level cannot be detected. Furthermore, it must be taken into account that an access point or WLAN client cannot transmit data when in the measurement mode, and therefore a reduction in the performance, and possibly the availability, of WLAN data transmissions may need to be accepted. Likewise, a small window of vulnerability always remains open when using the access points belonging to the live network in the scan mode, and it is impossible to monitor the wireless interface when scanning.
Whenever an intrusion detection system or even an intrusion prevention system (IPS) is used, the normal communication patterns in the WLAN must be determined or defined based on measurements (see also S 5.71 Intrusion detection and intrusion response systems).
Alert and error handling
The WLAN administration should provide alert and error handling procedures. The following tasks must be performed by the administrators in this regard:
- assessment and evaluation of alerts, for example when a high number of unsuccessful attempts to provide authentication on an access point is detected
- assessment of statistics for troubleshooting
- triggering of safeguards when a security incident is suspected
- ability to change the threshold values triggering the alarms when the WLAN usage changes
Penetration testing
In the course of a security check, a WLAN can also be examined for vulnerabilities with the help of penetration tests. In this case, all security safeguards taken must be tested exactly to determine if they are able to defend against the attacks they are supposed to counteract. A penetration test should be conducted at least every six months, but no less than once per year.
Documentation
When conducting the security check, the administrators should document all steps taken so that they can be retaken at a later date (for example when it is suspected that a system has been compromised). The results of the security check must be documented, and deviations from the target state must be examined.
Review questions:
- Is the WLAN's availability checked regularly?
- Do the checks to be performed monitor the compliance with the specified security policies?
- Is there a provision governing the handling of error and alert messages for the administrator?
- Are the results of security checks documented comprehensibly, compared to the target state, and are deviations investigated into?