Configure key encryption
Summary​
The organization must prefer the use of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods.
Description​
empty
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References​
- OWASP TOP 10-A5. Security misconfiguration
- NY SHIELD Act-5575_B_6. Personal and private information
- NYDFS-500_15. Encryption of nonpublic information
- PA-DSS-2_5. Implement key management processes and procedures for cryptographic keys used for encryption of cardholder data
- PA-DSS-6_1. The wireless technology must be implemented securely
- PA-DSS-6_2. For wireless technology, implement strong encryption for authentication and transmission
- CMMC-AC_L2-3_1_17. Wireless access protection
- CMMC-SC_L1-3_13_1. Boundary protection
- CMMC-SC_L2-3_13_10. Key management
- HITRUST CSF-09_m. Network controls
- ISO/IEC 27002-8_20. Network controls
- OSSTMM3-9_7_4. Wireless security (controls verification) - Integrity
- ISSAF-L_8. Network security - WLAN security (global countermeasures)
- PTES-3_7_1. Identify protection mechanisms - Network based protections
- PTES-6_7_6_1. Exploitation - Proximity access (wifi attacks)
- C2M2-9_5_e. Implement data security for cybersecurity architecture
- PCI DSS-2_3_2. Wireless environments are configured and managed securely
- SIG Core-N_1_12. Network security
- CWEâ„¢-1262. Improper access control for register interface
- ISO/IEC 27001-8_20. Network controls
Vulnerabilities​
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.