Hello security-basics, I'm working out the last kinks in our Policy and Procedures for Wireless Networking within our department. Can any of you all see anything that I should change or that I missed?
I am already aware that some of this will change once 802.11i becomes ratified and silicon is available (if AES requires a co-processor). Additionally, we have some legacy machines that do not support WPA, so we can't quite go there just yet. Thanks in advance. P.S. This Policy and Procedure is being developed by a State agency, it is public domain. If you find anything that you want to include in your own. Feel free. A. Minimum settings required for APs and client NICs 1. SSID beaconing must be disabled. 2. SSID should be non-descriptive (i.e. not Corp3rdFloorFinance). 3. AP and NICs must support a minimum of 128-bit WEP encryption. 4. WAP must be configured with MAC address level controls. 5. A firewall must be installed between the WAP and the wired network. (Note: Should WAPs with a built in firewall be acceptable?) 6. Minimize perimeter leakage as much as possible by keeping the WAP as centrally located in the building as possible. 7. Default AP logon access accounts should be renamed and strong passwords must be used. 8. Minimum wireless standards must not be compromised in order to accommodate other wireless devices such as PDAs and cell phones. 9. WEP keys must be rotated every five hours. 10. End users will only have read access to Wi-Fi settings. 11. AD-HOC mode must be disabled. 12. Monitoring for rogue APs will be performed on a weekly basis and should be a randomly chosen day each week. 13. Inspect outer perimeter of building for warchalk markings on a weekly basis. 14. If feasible, the WAP should be turned off at the end of the day, but NICs should not be removed from the client machines (to prevent zeroizing the IV), unless they need to be physically secured. B. Minimum capabilities and limitations of AP and client NIC hardware 1. WAP and NICs must be capable of utilizing dynamic WEP keys. 2. Wi-Fi NICs must be capable of disabling ad-hoc functionality. C. Authentication methodology 1. To ensure standard configuration for mobile users traveling within the state to other facilities, and to ensure compliancy with the minimum security practices for wi-fi networks, the wireless network authentication will be centralized on a Cisco ACS server located at the Corp building. 2. Cisco Aironet 1200 APs and Cisco client NICs will be hardened utilizing Cisco’s LEAP authentication technology. (Note: Section C is preliminary at this point. We are also evaluating a Cranite solution. <http://www.cranite.com>) D. Implementation Standards 1. Acceptable a. These are the minimum acceptable standards for implementing a wireless network for a period exceeding two weeks. This level of security is achievable using a standard Windows 2000 server install. i. Must include the settings and procedures presented in section A. ii. Must use VPN tunneling and IPSEC. iii. All failed login attempts must be logged, and the log will be reviewed daily iv. Monitor public warchalk websites for listings of our sites. (possibly assigned to an oversight person). 2. Optimum a. These are the optimal standards for implementing a wireless network as a permanent installation. This level of security is achievable using a standard Windows 2000 server install implementing 802.1x EAP-TLS (Requires a CA server). i. Must include the settings and procedures presented in section A. ii. Fast Packet Keying must be implemented. iii. You must implement 802.1x/EAP utilizing user credentials (RADIUS and TLS/TTLS). iv. All failed login attempts must be logged, and the log will be reviewed daily. v. Monitor public warchalk websites for listings of our sites (possibly assigned to an oversight person). -- Leif