Last modified: 14 kovo, 2025
Policy No. 4204 Wireless Device Communication Procedure
Apžvalga
With the mass explosion of smartphones and tablets, pervasive wireless connectivity is almost a given at any organization. Unsecured wireless configurations can provide an easy open door for malicious threat actors.
Tikslas
The purpose of this procedure is to secure and protect assets owned by PCSD. PCSD provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. PCSD grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all assets.
This procedure specifies the conditions that wireless infrastructure devices must satisfy to connect to the PCSD network. Only those wireless devices that meet the standards specified in this procedure or are granted an exception by the InfoSec team are approved for connectivity to a PCSD network.
Apimtis
All employees, contractors, consultants, temporary and other workers at PCSD, including all personnel affiliated with third parties that maintain a wireless device on behalf of PCSD, must adhere to this procedure. This procedure applies to all wireless devices that connect to a PCSD network or reside at a PCSD location.
The following list includes, but is not limited to, endpoint devices such as laptops, desktops, cellular phones, and tablets. This includes any form of wireless communication device capable of transmitting packet data.
Procedūra
General Requirements
- All wireless devices that reside at a PCSD location and connect to a PCSD network, or provide access to information classified as Confidential or above, must abide by the standards specified in the Wireless Infrastructure Communication Procedure.
- Use PCSD-approved authentication protocols and infrastructure.
- Use PCSD-approved encryption protocols.
- Maintain a hardware address (MAC address) that can be registered and tracked.
Last Update Status:
Updated January 2015
Related Policies and Procedures
- 4204 Priimtinas naudojimas
- 4204 Auditas
- 4204 Švarus stalas
- 4204 Atkūrimo po nelaimės planas
- 4204 El. paštas
- 4204 Darbuotojų informuotumo apie saugumą mokymas
- 4204 Šifravimas
- 4204 Slaptažodis
- 4204 Nuotolinė prieiga
- 4204 Maršrutizatorių ir komutatorių saugumas
- 4204 Jautrių darbo vietų saugumas
- 4204 Saugumo reagavimo planas
- 4204 Serverio saugumas
- 4204 Programinės įrangos diegimas
- 4204 Interneto svetainių paslaugos Saugumas
- 4204 Belaidis įrenginio ryšys
- 4204 Belaidis infrastruktūros ryšys