On Mon, Mar 6, 2017 at 2:23 PM, Brüns, Stefan
<[email protected]> wrote:
> On So, 2017-03-05 at 09:39 -0500, Greg Freemyer wrote:
<snip>
>
>> If a user of that WiFi ever brings in a device with a non-static MAC,
>> I will have to get with them and figure out how to make the MAC
>> static.  I'm not going to allow a device on that WiFi to trigger
>> notices to me routinely and it is an important security control to
>> know who is connecting to a non-guest WiFi.
>
> Sorry, but mentioning MAC address monitoring and security in a single
> sentence is ridiculous. The MAC addresses are broadcasted over the air,
> and can be altered in most cases (even many Android phones).
>
> Kind regards,
>
> Stefan

Stefan,

I know MAC spoofing isn't hard to accomplish, but monitoring for new
to the network MACs is a best practice in the CIS CC v6.1 document as
I recall.

https://www.cisecurity.org/critical-controls/Library.cfm

It's also low hanging fruit that can be done at no cost.

Greg
--
To unsubscribe, e-mail: [email protected]
To contact the owner, e-mail: [email protected]

Reply via email to