Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol- Transport Layer Security (EAP/TLS), that requires mutual, multi-factor authentication.
For each identified wireless access point, examine its configuration for the following noting appropriately and inappropriately configured endpoints along the way:
Configured authentication protocol (compare to list of authorized authentication protocols)
Enumerate all appropriately configured endpoints
Enumerate all inappropriately configured endpoints
Measures:
M1 = List of all wireless access points
M2 = List of appropriately configured wireless access points
M3 = List of inappropriately configured wireless access points
M4 = |M1|
M5 = |M2|
M6 = |M3|
Metrics:
M5 / M4 = Ratio of appropriately configured wireless access points to the total number of wireless access points
Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol- Transport Layer Security (EAP/TLS), that requires mutual, multi-factor authentication.
Measures
Metrics